Skip to content

Commit 8e4fc9a

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into prefix
2 parents 386e2df + e183a21 commit 8e4fc9a

36 files changed

+110
-45
lines changed

articles/app-service/networking-features.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,14 @@ Some use cases for this feature:
118118
* Expose your app on a private IP in your virtual network.
119119
* Protect your app with a WAF.
120120

121-
Private endpoints prevent data exfiltration because the only thing you can reach across the private endpoint is the app with which it's configured.
122-
121+
Private endpoints prevent data exfiltration because the only thing you can reach across the private endpoint is the app with which it's configured.
122+
123+
### Network Security Perimeter
124+
125+
Azure [Network Security Perimeter](../private-link/network-security-perimeter-concepts.md) (NSP) is a service that provides a secure perimeter for communication of Platform as a Service (PaaS) services. These PaaS services can communicate with each other within the perimeter, and can also communicate with resources outside the perimeter using public inbound and outbound access rules.
126+
127+
NSP rule enforcement is primarily using identity-based security which cannot be fully enforced in platform services like App Services and Functions that allow you to deploy your own code and use the identity to represent the platform. If you need to communicate with PaaS services that are part of an NSP you will need to add virtual network integration to you App Service or Functions instances and communicate with the PaaS resources using private endpoints.
128+
123129
### Hybrid Connections
124130

125131
App Service Hybrid Connections enables your apps to make *outbound* calls to specified TCP endpoints. The endpoint can be on-premises, in a virtual network, or anywhere that allows outbound traffic to Azure on port 443. To use the feature, you need to install a relay agent called Hybrid Connection Manager on a Windows Server 2012 or newer host. Hybrid Connection Manager needs to be able to reach Azure Relay at port 443. You can download Hybrid Connection Manager from the App Service Hybrid Connections UI in the portal.

articles/automation/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@
266266
href: change-tracking/manage-change-tracking-monitoring-agent.md
267267
- name: Configure alerts
268268
href: change-tracking/configure-alerts.md
269-
- name: Migration from Change Tracking and Inventory using AMA to Change Tracking using LA (Retired)
269+
- name: Migration from Change Tracking and Inventory using AMA to Change Tracking using LA
270270
items:
271271
- name: Migration from Log Analytics to Azure Monitoring Agent version
272272
href: change-tracking/guidance-migration-log-analytics-monitoring-agent.md

articles/azure-cache-for-redis/cache-web-app-aspnet-core-howto.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,12 @@ In your command window, execute the following command to store a new secret name
6161
```dos
6262
dotnet user-secrets set RedisHostName "<cache-name>.redis.cache.windows.net"
6363
```
64+
6465
For using Azure Managed Redis (preview) instance, store a new secret named RedisHostName as below:
6566

6667
```dos
6768
dotnet user-secrets set RedisHostName "<cache-name>.<region>.redis.azure.net"
69+
```
6870

6971
## Connect to the cache with RedisConnection
7072

articles/backup/encryption-at-rest-with-cmk-for-backup-vault.md

Lines changed: 64 additions & 20 deletions
Large diffs are not rendered by default.
-68.9 KB
Loading
60.5 KB
Loading
106 KB
Loading
-41.6 KB
Loading
90.6 KB
Loading
196 KB
Loading

0 commit comments

Comments
 (0)