Skip to content

Commit b8c75f5

Browse files
author
Ankita Dutta
committed
NW doc fixes
1 parent 508c9ba commit b8c75f5

File tree

3 files changed

+17
-14
lines changed

3 files changed

+17
-14
lines changed

articles/network-watcher/network-watcher-nsg-flow-logging-azure-resource-manager.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,11 +107,11 @@ Below are two examples of complete templates to set up NSG Flow Logs.
107107
```
108108

109109
> [!NOTE]
110-
> * The name of resource has the format "Parent Resource_Child resource". Here, the parent resource is the regional Network Watcher instance (Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centraluseuap)
110+
> * The name of the resource has the format "Parent Resource_Child resource". Here, the parent resource is the regional Network Watcher instance (Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centraluseuap)
111111
> * targetResourceId is the resource ID of the target NSG
112112
> * storageId is the resource ID of the destination storage account
113113
114-
**Example 2**: The following templates enabling NSG Flow Logs (version 2) with a retention for 5 days. Enabling Traffic Analytics with a processing interval of 10 minutes.
114+
**Example 2**: The following templates enable NSG Flow Logs (version 2) with retention for 5 days. Enabling Traffic Analytics with a processing interval of 10 minutes.
115115

116116
```json
117117
{

articles/network-watcher/network-watcher-nsg-flow-logging-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: devx-track-azurepowershell
2121
2222
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in JSON format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
2323

24-
The detailed specification of all NSG flow log commands for various versions of AzPowerShell can be found [here](/powershell/module/az.network/#network-watcher)
24+
The detailed specification of all NSG flow logs commands for various versions of AzPowerShell can be found [here](/powershell/module/az.network/#network-watcher)
2525

2626
> [!NOTE]
2727
> - The commands [Get-AzNetworkWatcherFlowLogStatus](/powershell/module/az.network/get-aznetworkwatcherflowlogstatus) and [Set-AzNetworkWatcherConfigFlowLog](/powershell/module/az.network/set-aznetworkwatcherconfigflowlog) used in this doc, requires an additional "reader" permission in the resource group of the network watcher. Also, these commands are old and may soon be deprecated.

articles/network-watcher/nsg-flow-logs-policy-portal.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,20 @@ ms.author: damendo
1919
# QuickStart: Deploy and manage NSG Flow Logs using Azure Policy
2020

2121
## Overview
22-
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we will use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
22+
23+
Azure Policy helps to enforce organizational standards and to assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we will use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
2324

2425
If you are creating an Azure Policy definition for the first time, you can read through:
2526
- [Azure Policy overview](../governance/policy/overview.md)
2627
- [Tutorial for creating an Azure Policy assignment](../governance/policy/assign-policy-portal.md#create-a-policy-assignment).
2728

2829

2930
## Locate the policies
31+
3032
1. Go to the Azure portal – [portal.azure.com](https://portal.azure.com)
3133

32-
Navigate to Azure Policy page by searching for Policy in the top search bar
34+
Navigate to the Azure Policy page by searching for Policy in the top search bar
35+
3336
![Policy Home Page](./media/network-watcher-builtin-policy/1_policy-search.png)
3437

3538
2. Head over to the **Assignments** tab from the left pane
@@ -66,13 +69,13 @@ If you want to see the full definition of the policy, you can visit the [Definit
6669

6770
1. Fill in your policy details
6871

69-
- Scope: A subscription is the common choice, you can also choose a management group or resource group as relevant to you.
72+
- Scope: A subscription is a common choice, you can also choose a management group or resource group as relevant to you.
7073
- Policy Definition: Should be chosen as shown in the "Locate the policies" section.
7174
- AssignmentName: Choose a descriptive name
7275

7376
2. Click on "Review + Create" to review your assignment
7477

75-
The policy does not require any parameters. As you are assigning an audit policy, you do not need to fill the details in the "Remediation" tab.
78+
The policy does not require any parameters. As you are assigning an audit policy, you do not need to fill in the details in the "Remediation" tab.
7679

7780
![Audit Policy Review](./media/network-watcher-builtin-policy/5_1_audit-policy-review.png)
7881

@@ -95,7 +98,7 @@ If you want to see the full definition of the policy, you can visit the [Definit
9598

9699
1. Fill in your policy details
97100

98-
- Scope: A subscription is the common choice, you can also choose a management group or resource group as relevant to you.
101+
- Scope: A subscription is a common choice, you can also choose a management group or resource group as relevant to you.
99102
- Policy Definition: Should be chosen as shown in the "Locate the policies" section.
100103
- AssignmentName: Choose a descriptive name
101104

@@ -104,17 +107,17 @@ If you want to see the full definition of the policy, you can visit the [Definit
104107
The Network Watcher service is a regional service. These parameters allow the policy action of deploying flow logs to be executed.
105108
- NSG Region: Azure regions at which the policy is targeted
106109
- Storage ID: Full resource ID of the storage account. Note: This storage account should be in the same region as the NSG.
107-
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you have not renamed it, you can enter 'NetworkWatcherRG' which is the default.
110+
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you have not renamed it, you can enter `NetworkWatcherRG` which is the default.
108111
- Network Watcher name: Name of the regional network watcher service. Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centralus. See the full list.
109112

110113
![DINE Policy parameters](./media/network-watcher-builtin-policy/5_2_1_dine-policy-details-alt.png)
111114

112115
3. Add Remediation details
113116

114-
- Check mark on "Create Remediation task" if you want the policy to affect existing resources
115-
- "Create a Managed Identity" should be already checked
116-
- Selected the same location as previous for your Managed Identity
117-
- You will need Contributor or Owner permissions to use this policy. If you have these permissions, you should not see any errors.
117+
- Check mark on **Create Remediation task** if you want the policy to affect existing resources
118+
- **Create a Managed Identity** should be already checked
119+
- Select the same location as previous for your Managed Identity
120+
- You will need Contributor or Owner permission to use this policy. If you have these permissions, you should not see any errors.
118121

119122
![DINE Policy remediation](./media/network-watcher-builtin-policy/5_2_2_dine-remediation.png)
120123

@@ -127,7 +130,7 @@ You should see something similar to the following screenshot.
127130
### Results
128131

129132
To check the results, open the Compliance tab and search for the name of your Assignment.
130-
You should see something like following screenshot once your policy. In case your policy hasn't run, wait for some time.
133+
You should see something like the following screenshot once your policy. In case your policy hasn't run, wait for some time.
131134

132135
![DINE Policy results](./media/network-watcher-builtin-policy/7_2_dine-policy-results.png)
133136

0 commit comments

Comments
 (0)