Skip to content

Commit ad26d7d

Browse files
committed
reword
1 parent 7b130bc commit ad26d7d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/lab-services/concept-lab-services-supported-networking-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The following table lists common networking scenarios and topologies and their s
3535
| Use a connection broker, such as Parsec, for high-framerate gaming scenarios | Not recommended | This scenario isn’t directly supported with Azure Lab Services and would run into the same challenges as accessing lab VMs by private IP address. |
3636
| *Cyber field* scenario, consisting of a set of vulnerable VMs on the network for lab users to discover and hack into (ethical hacking) | Yes | This scenario works with advanced networking for lab plans. Learn about the [ethical hacking class type](./class-type-ethical-hacking.md). |
3737
| Enable using Azure Bastion for lab VMs | No | Azure Bastion isn't supported in Azure Lab Services. |
38-
| Set up line-of-sight to domain controller | Not recommended | Line-of-sight from a lab to a domain controller is required to Hybrid AAD join or AD domain join VMs; however, we currently do *not* recommend that lab VMs be AAD joined/registered, Hybrid AAD joined, or AD domain joined due to the complexity involved. |
38+
| Set up line-of-sight to domain controller | Not recommended | Line-of-sight from a lab to a domain controller is required to Hybrid AAD join or AD domain join VMs; however, we currently do *not* recommend that lab VMs be AAD joined/registered, Hybrid AAD joined, or AD domain joined due to product limitations. |
3939

4040
## Next steps
4141

0 commit comments

Comments
 (0)