Skip to content

Commit 9656fc0

Browse files
committed
acrolinx
1 parent 92994fa commit 9656fc0

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/dns/dns-security-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This article provides an overview of DNS security policy. Also see the following
2222
## What DNS security policy?
2323

2424
DNS security policy offers the ability to filter and log DNS queries at the virtual network (VNet) level. With DNS security policy you can:
25-
- Create rules to protect against DNS-based attacks by blocking block name resolution of known or malicious domains.
25+
- Create rules to protect against DNS-based attacks by blocking name resolution of known or malicious domains.
2626
- Save and view detailed DNS logs to gain inside into your DNS traffic.
2727

2828
DNS logs can be sent to a storage account, log analytics workspace, or event hubs. You can choose to allow, alert, or block DNS queries.
@@ -37,7 +37,7 @@ DNS Security Policy can be configured using Azure PowerShell or the Azure portal
3737

3838
### Location
3939

40-
A security policy can only apply to VNets in the same region. You can create any number of security policies in the same region. In the following example, two polices are created in each of two different regions (East US and Central US).
40+
A security policy can only apply to VNets in the same region. You can create any number of security policies in the same region. In the following example, two policies are created in each of two different regions (East US and Central US).
4141

4242
![Screenshot of the list of DNS security policies.](./media/dns-security-policy/policy-list.png)
4343

@@ -79,7 +79,7 @@ You can associate a domain list to multiple DNS traffic rules in different secur
7979

8080
![Screenshot of domains inside a domain list.](./media/dns-security-policy/domain-list-detailed.png)
8181

82-
When viewing a DNS domain list in the Azure portal, you can also select **Settings** > **Associated DNS Traffic Rules** to see a list of all traffic rules and thye associated DNS security policies that reference the DNS domain list.
82+
When viewing a DNS domain list in the Azure portal, you can also select **Settings** > **Associated DNS Traffic Rules** to see a list of all traffic rules and the associated DNS security policies that reference the DNS domain list.
8383

8484
![Screenshot of associated domain list traffic rules.](./media/dns-security-policy/domain-list-traffic-rules.png)
8585

articles/dns/dns-traffic-log-how-to.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To create a DNS security policy using the Azure portal:
4141
![Screenshot of the Basics tab for security policy.](./media/dns-traffic-log-how-to/secpol-basics.png)
4242

4343
5. Select **Next: Virtual Networks Link** and then select **+ Add**.
44-
6. VNets in the same region as the security policy are displayed. Select one or more available VNets and then select **Add**. You can't choose a VNet that is already associated with another security policy. In the following example, two VNets have already been associated with a security policy, leaving two VNets available to select.
44+
6. VNets in the same region as the security policy are displayed. Select one or more available VNets and then select **Add**. You can't choose a VNet that is already associated with another security policy. In the following example, two VNets are associated with a security policy, leaving two VNets available to select.
4545

4646
![Screenshot of the Virtual Network Links tab for security policy.](./media/dns-traffic-log-how-to/secpol-vnet-links.png)
4747

@@ -52,7 +52,7 @@ To create a DNS security policy using the Azure portal:
5252
> [!NOTE]
5353
> Virtual network links are created for all VNets displayed in the list, whether or not they are *selected*. Use checkboxes to select VNets for removal from the list.
5454
55-
8. Select **Review + create** and then select **Create**. Choosing **Next: DNS Traffic Rules** is skipped here, but you also have the option to create traffic rules now. In this guide, traffic rules and DNS domain lists are created and applied to DNS security policy later.
55+
8. Select **Review + create** and then select **Create**. Choosing **Next: DNS Traffic Rules** is skipped here, but you can also create traffic rules now. In this guide, traffic rules and DNS domain lists are created and applied to DNS security policy later.
5656

5757
## Create a log analytics workspace
5858

@@ -102,9 +102,9 @@ To create a DNS domain list using the Azure portal:
102102

103103
![Screenshot of creating a DNS Domain List.](./media/dns-traffic-log-how-to/create-domain-list.png)
104104

105-
7. When you have completed entering domain names, select **Review + create** and then select **Create**.
105+
7. When you complete entering domain names, select **Review + create** and then select **Create**.
106106

107-
Repeat this section to create additional domain lists if desired. Each domain list can be associated to a traffic rule that has one of three actions:
107+
Repeat this section to create more domain lists if desired. Each domain list can be associated to a traffic rule that has one of three actions:
108108

109109
- **Allow**: Permit the DNS query and log it.
110110
- **Block**: Block the DNS query and log the block action.
@@ -150,7 +150,7 @@ See the following example:
150150

151151
[ ![Screenshot of an example log analytics query.](./media/dns-traffic-log-how-to/test-query.png) ](./media/dns-traffic-log-how-to/test-query.png#lightbox)
152152

153-
Recall that the traffic rule containing contoso.com was set to **Allow** queries. The query from the VM results in a successful response:
153+
Recall that the traffic rule containing contoso.com was set to **Allow** queries. The query from the virtual machine results in a successful response:
154154

155155
```cmd
156156
C:\>dig db.sec.contoso.com +short
@@ -165,7 +165,7 @@ Expanding the query details in log analytics displays data such as:
165165
* ResolutionPath: PrivateDnsResolution
166166
* ResolverPolicyRuleAction: Allow
167167

168-
If the traffic rule is edited and set to **Block** contoso.com queries, the query from the VM results in a failed response. Be sure to select **Save** when you change the components of a rule.
168+
If the traffic rule is edited and set to **Block** contoso.com queries, the query from the virtual machine results in a failed response. Be sure to select **Save** when you change the components of a rule.
169169

170170
![Screenshot of editing a traffic rule.](./media/dns-traffic-log-how-to/edit-rule.png)
171171

0 commit comments

Comments
 (0)