Skip to content

Commit a2a1378

Browse files
committed
acro fixes
1 parent 431dcd3 commit a2a1378

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/firewall-manager/quick-secure-virtual-hub.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: victorh
1313

1414
In this quickstart, you use a Resource Manager template to secure your virtual hub using Azure Firewall Manager.
1515

16-
The deployed firewall has a application rule that allow connections to `www.microsoft.com` . Two Windows Server 2019 virtual machines are deployed to test the firewall. One jump server is used to connect to the workload server. From the workload server, you can only connect to `www.microsoft.com`.
16+
The deployed firewall has an application rule that allows connections to `www.microsoft.com` . Two Windows Server 2019 virtual machines are deployed to test the firewall. One jump server is used to connect to the workload server. From the workload server, you can only connect to `www.microsoft.com`.
1717

1818
[!INCLUDE [About Azure Resource Manager](../../includes/resource-manager-quickstart-introduction.md)]
1919

@@ -23,9 +23,9 @@ For more information about Azure Firewall Manager Preview, see [What is Azure Fi
2323

2424
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2525

26-
## Create an secured virtual hub
26+
## Create a secured virtual hub
2727

28-
This template creates an secured virtual hub using Azure Firewall Manager Preview, along with the necessary resources to support the scenario.
28+
This template creates a secured virtual hub using Azure Firewall Manager Preview, along with the necessary resources to support the scenario.
2929

3030
### Review the template
3131

@@ -71,12 +71,12 @@ Now, test the firewall rules to confirm that it works as expected.
7171
1. From the Azure portal, review the network settings for the **Workload-Srv** virtual machine and note the private IP address.
7272
2. Connect a remote desktop to **Jump-Srv** virtual machine, and sign in. From there, open a remote desktop connection to the **Workload-Srv** private IP address.
7373

74-
3. Open Internet Explorer and browse to https://www.microsoft.com.
74+
3. Open Internet Explorer and browse to `www.microsoft.com`.
7575
4. Select **OK** > **Close** on the Internet Explorer security alerts.
7676

7777
You should see the Microsoft home page.
7878

79-
5. Browse to https://www.google.com.
79+
5. Browse to `www.google.com`.
8080

8181
You should be blocked by the firewall.
8282

0 commit comments

Comments
 (0)