Skip to content

Commit bfff329

Browse files
Initial changes
1 parent 15b1811 commit bfff329

10 files changed

+18
-272
lines changed

articles/storage/.openpublishing.redirection.storage.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -560,6 +560,11 @@
560560
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
561561
"redirect_document_id": false
562562
},
563+
{
564+
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-prevent-classic.md",
565+
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
566+
"redirect_document_id": false
567+
},
563568
{
564569
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-ruby.md",
565570
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-ruby",

articles/storage/blobs/TOC.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -384,10 +384,8 @@ items:
384384
items:
385385
- name: Overview
386386
href: anonymous-read-access-overview.md
387-
- name: Remediate anonymous access (Azure Resource Manager deployments)
387+
- name: Remediate anonymous access
388388
href: anonymous-read-access-prevent.md
389-
- name: Remediate anonymous access (classic deployments)
390-
href: anonymous-read-access-prevent-classic.md
391389
- name: Configure anonymous access
392390
href: anonymous-read-access-configure.md
393391
- name: Microsoft Defender for Storage

articles/storage/blobs/anonymous-read-access-configure.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,7 @@ Azure Storage supports optional anonymous read access for containers and blobs.
2020
> [!WARNING]
2121
> When a container is configured for anonymous access, any client can read data in that container. Anonymous access presents a potential security risk, so if your scenario does not require it, we recommend that you remediate anonymous access for the storage account.
2222
23-
This article describes how to configure anonymous read access for a container and its blobs. For information about how to remediate anonymous access for optimal security, see one of these articles:
24-
25-
- [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md)
26-
- [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md)
23+
This article describes how to configure anonymous read access for a container and its blobs. For information about how to remediate anonymous access for optimal security, see [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md).
2724

2825
## About anonymous read access
2926

articles/storage/blobs/anonymous-read-access-overview.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -23,19 +23,11 @@ This article provides an overview of how to remediate anonymous access for your
2323
2424
## Recommendations for remediating anonymous access
2525

26-
To remediate anonymous access, first determine whether your storage account uses the Azure Resource Manager deployment model or the classic deployment model. For more information, see [Resource Manager and classic deployment](../../azure-resource-manager/management/deployment-models.md).
27-
28-
### Azure Resource Manager accounts
29-
30-
If your storage account is using the Azure Resource Manager deployment model, then you can remediate anonymous access for an account at any time by setting the account's **AllowBlobPublicAccess** property to **False**. After you set the **AllowBlobPublicAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
26+
You can remediate anonymous access for an account at any time by setting the account's **AllowBlobPublicAccess** property to **False**. After you set the **AllowBlobPublicAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
3127

3228
If your storage account is using the Azure Resource Manager deployment model, then you can remediate anonymous access for an account at any time by setting the account's **AllowBlobAnonymousAccess** property to **False**. After you set the **AllowBlobAnonymousAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
3329

34-
To learn more about how to remediate anonymous access for Azure Resource Manager accounts, see [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md).
35-
36-
### Classic accounts
37-
38-
If your storage account is using the classic deployment model, then you can remediate anonymous access by setting each container's access property to **Private**. To learn more about how to remediate anonymous access for classic storage accounts, see [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md).
30+
To learn more about how to remediate anonymous access for Azure Resource Manager accounts, see [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md).
3931

4032
### Scenarios requiring anonymous access
4133

@@ -45,5 +37,4 @@ For information on how to configure containers for anonymous access, see [Config
4537

4638
## Next steps
4739

48-
- [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md)
49-
- [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md)
40+
- [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md)

articles/storage/blobs/anonymous-read-access-prevent-classic.md

Lines changed: 0 additions & 236 deletions
This file was deleted.

0 commit comments

Comments
 (0)