Skip to content

Commit a3c0c7b

Browse files
authored
Update connect-logstash-data-connection-rules.md
1 parent 7edd97c commit a3c0c7b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sentinel/connect-logstash-data-connection-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -451,9 +451,9 @@ Define network settings and enable network isolation for Microsoft Sentinel Logs
451451

452452
#### Virtual network service tags
453453

454-
Microsoft Sentinel output plugin supports [Azure virtual network service tags](../virtual-network/service-tags-overview.md). Both *AzureMonitor* and *AzureActiveDirectory* tags are required.
454+
Microsoft Sentinel output plugin supports [Azure virtual network service tags](/azure/virtual-network/service-tags-overview). Both *AzureMonitor* and *AzureActiveDirectory* tags are required.
455455

456-
Azure Virtual network service tags can be used to define network access controls on [network security groups](../virtual-network/network-security-groups-overview.md#security-rules), [Azure Firewall](../firewall/service-tags.md), and user-defined routes. Use service tags in place of specific IP addresses when you create security rules and routes. For scenarios where Azure virtual network service tags cannot be used, the Firewall requirements are given below.
456+
Azure Virtual Network service tags can be used to define network access controls on [network security groups](/azure/virtual-network/network-security-groups-overview#security-rules), [Azure Firewall](/azure/firewall/service-tags), and user-defined routes. Use service tags in place of specific IP addresses when you create security rules and routes. For scenarios where Azure Virtual Network service tags cannot be used, the firewall requirements are given below.
457457

458458
#### Firewall requirements
459459

@@ -462,7 +462,7 @@ The following table lists the firewall requirements for scenarios where Azure vi
462462
| Cloud |Endpoint |Purpose |Port |Direction |Bypass HTTPS inspection|
463463
|------|------|------|---------|--------|--------|
464464
| Azure Commercial |https://login.microsoftonline.com |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
465-
| Azure Commercial |https://[data collection endpoint name].[Azure cloud region].ingest.monitor.azure.com| Data collection Endpoint|Port 443 |Outbound|Yes |
465+
| Azure Commercial |`https://<data collection endpoint name>.<Azure cloud region>.ingest.monitor.azure.com`| Data collection Endpoint|Port 443 |Outbound|Yes |
466466
| Azure Government |https://login.microsoftonline.us |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
467467
| Azure Government |Replace '.com' above with '.us' | Data collection Endpoint|Port 443 |Outbound|Yes |
468468
| Microsoft Azure operated by 21Vianet |https://login.chinacloudapi.cn |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |

0 commit comments

Comments
 (0)