Skip to content

Commit a020565

Browse files
authored
Update ddos-protection-features.md
The term 'e.g' is used in the Always-on traffic monitoring section of the article: https://learn.microsoft.com/en-us/azure/ddos-protection/ddos-protection-features#always-on-traffic-monitoring As per Knowledge Management Quality & Style Review - Recommend using 'for example:' instead - Internal link to KM Quality & Style article with this info: https://internal.evergreen.microsoft.com/en-us/topic/86dedf26-9578-55d2-9833-94057789d92c
1 parent 6bf47c9 commit a020565

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/ddos-protection/ddos-protection-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure DDoS Protection monitors actual traffic utilization and constantly compare
2121
During mitigation, traffic sent to the protected resource is redirected by the DDoS protection service and several checks are performed, such as:
2222

2323
- Ensure packets conform to internet specifications and aren't malformed.
24-
- Interact with the client to determine if the traffic is potentially a spoofed packet (e.g: SYN Auth or SYN Cookie or by dropping a packet for the source to retransmit it).
24+
- Interact with the client to determine if the traffic is potentially a spoofed packet (for example: SYN Auth or SYN Cookie or by dropping a packet for the source to retransmit it).
2525
- Rate-limit packets, if no other enforcement method can be performed.
2626

2727
Azure DDoS Protection drops attack traffic and forwards the remaining traffic to its intended destination. Within a few minutes of attack detection, you're notified using Azure Monitor metrics. By configuring logging on DDoS Protection telemetry, you can write the logs to available options for future analysis. Metric data in Azure Monitor for DDoS Protection is retained for 30 days.

0 commit comments

Comments
 (0)