You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Bicep, so that I can control the network traffic to and from the resource.
12
12
# Customer intent: As a network administrator, I want to create a network security perimeter for an Azure Key Vault using Bicep, so that I can manage network traffic securely within a defined boundary.
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: azure-private-link
8
8
ms.custom:
9
9
- ignite-2024
10
10
ms.topic: quickstart
11
-
ms.date: 03/25/2025
11
+
ms.date: 08/01/2025
12
12
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
13
13
# Customer intent: As a network administrator, I want to create a network security perimeter for an Azure Key Vault using Azure CLI, so that I can control and monitor the network traffic to and from the resource effectively.
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: quickstart
9
-
ms.date: 03/25/2025
9
+
ms.date: 08/01/2025
10
10
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure portal, so that I can control the network traffic to and from the resource.
11
11
# Customer intent: As a network administrator, I want to create a network security perimeter for an Azure Key Vault in the Azure portal, so that I can manage and control network traffic securely for the resource.
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: quickstart
9
-
ms.date: 03/25/2025
9
+
ms.date: 08/01/2025
10
10
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure PowerShell, so that I can control the network traffic to and from the resource.
11
11
# Customer intent: As a network administrator, I want to create and manage a network security perimeter for an Azure Key Vault using PowerShell, so that I can enhance security by controlling the network traffic within a trusted boundary.
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure Resource Manager template, so that I can control the network traffic to and from the resource.
11
11
# Customer intent: As a network administrator, I want to create a network security perimeter for an Azure Key Vault using an ARM template, so that I can control and secure the network traffic to and from the resource effectively.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+22-12Lines changed: 22 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: overview
9
-
ms.date: 07/29/2025
9
+
ms.date: 08/01/2025
10
10
ms.custom:
11
11
- references_regions, ignite-2024
12
12
- ai-gen-docs-bap
@@ -94,21 +94,31 @@ For example, upon creating a network security perimeter and associating a set of
94
94
95
95
A network security perimeter-aware private link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private link resources are as follows:
96
96
97
-
| Private link resource name | Resource type | Resources |
|[Azure Monitor](/azure/azure-monitor/essentials/network-security-perimeter)| Microsoft.Insights/dataCollectionEndpoints</br>Microsoft.Insights/ScheduledQueryRules</br>Microsoft.Insights/actionGroups</br>Microsoft.OperationalInsights/workspaces | Log Analytics Workspace, Application Insights, Alerts, Notification Service | Generally available |
100
+
|[Azure AI Search](/azure/search/search-security-network-security-perimiter)| Microsoft.Search/searchServices || Generally Available |
101
+
|[Cosmos DB](/azure/cosmos-db/how-to-configure-nsp)| Microsoft.DocumentDB/databaseAccounts || Public Preview |
102
+
|[Event Hubs](/azure/event-hubs/network-security-perimeter)| Microsoft.EventHub/namespaces || Generally Available |
103
+
|[Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview)| Microsoft.KeyVault/vaults || Generally Available |
104
+
|[SQL DB](/azure/azure-sql/database/network-security-perimeter)| Microsoft.Sql/servers || Public Preview |
105
+
|[Storage](/azure/storage/common/storage-network-security#network-secuirty-perimeter-preview)| Microsoft.Storage/storageAccounts || Generally Available |
106
+
|[Azure OpenAI service](/azure/ai-services/openai/how-to/network-security-perimeter)| Microsoft.CognitiveServices || Public Preview |
107
+
108
+
> [!IMPORTANT]
109
+
> The following onboarded services are in public preview with Network Security Perimeter:
110
+
> - Cosmos DB
111
+
> - SQL DB
112
+
> - Azure Open AI Service
113
+
>
114
+
> These previews are provided without a service level agreement, and it's not recommended for production workloads.
115
+
> Certain features might not be supported or might have constrained capabilities.
116
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
107
117
108
118
> [!NOTE]
109
119
> Refer to the respective private link resource documentation for information on currently unsupported scenarios.
110
120
111
-
## Supported access rules' types
121
+
## Supported access rule types
112
122
113
123
Network security perimeter supports the following access rule types:
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-diagnostic-logs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: concept-article
9
-
ms.date: 05/16/2025
9
+
ms.date: 08/01/2025
10
10
ms.custom: references_regions, ignite-2024
11
11
#CustomerIntent: As a network administrator, I want to enable diagnostic logging for Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
12
12
# Customer intent: "As a network administrator, I want to enable and configure diagnostic logging for the Network Security Perimeter, so that I can effectively monitor and analyze access logs for enhanced security oversight."
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-role-based-access-control-requirements.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: azure-private-link
8
8
ms.custom:
9
9
- ignite-2024
10
10
ms.topic: concept-article
11
-
ms.date: 11/04/2024
11
+
ms.date: 08/01/2025
12
12
# customer intent: As a network administrator, I want to know the Azure role-based access control permissions required to use network security perimeter capabilities, so that I can assign the correct permissions to my team members.
13
13
# Customer intent: As a network administrator, I want to understand the Azure RBAC permissions required for network security perimeter features, so that I can effectively assign roles and manage access within my team.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-transition.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,8 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: overview
9
-
ms.date: 05/16/2025
9
+
# Resolved conflict: keep the newer ms.date
10
+
ms.date: 08/01/2025
10
11
#CustomerIntent: As a network administrator, I want to understand the different access modes and how to transition to a network security perimeter in Azure.
11
12
# Customer intent: As a network administrator, I want to learn how to configure access modes and transition to a network security perimeter in Azure, so that I can secure my resources while minimizing connectivity disruptions.
12
13
---
@@ -15,6 +16,8 @@ ms.date: 05/16/2025
15
16
16
17
In this article, you learn about the different access modes and how to transition to a [network security perimeter](./network-security-perimeter-concepts.md) in Azure. Access modes control resource access and logging behavior, helping you secure your Azure resources.
0 commit comments