Skip to content

Commit ccc5f58

Browse files
authored
Merge pull request #216322 from v-amallick/Oct-28-2022-PEdeny
Deny public network address updates
2 parents 6799813 + 8f4ac47 commit ccc5f58

File tree

2 files changed

+20
-3
lines changed

2 files changed

+20
-3
lines changed
84.2 KB
Loading

articles/backup/private-endpoints.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Create and use private endpoints for Azure Backup
33
description: Understand the process to creating private endpoints for Azure Backup where using private endpoints helps maintain the security of your resources.
4-
ms.topic: conceptual
5-
ms.date: 11/09/2021
4+
ms.topic: how-to
5+
ms.date: 10/28/2022
66
ms.custom: devx-track-azurepowershell
77
author: v-amallick
88
ms.service: backup
@@ -32,6 +32,23 @@ Private endpoints for Backup can be only created for Recovery Services vaults th
3232

3333
See [this section](#create-a-recovery-services-vault-using-the-azure-resource-manager-client) to learn how to create a vault using the Azure Resource Manager client. This creates a vault with its managed identity already enabled.
3434

35+
## Deny public network access to the vault
36+
37+
You can configure your vaults to deny access from public networks.
38+
39+
Follow these steps:
40+
41+
1. Go to the *vault* > **Networking**.
42+
43+
2. On the **Public access** tab, select **Deny** to prevent access from public networks.
44+
45+
:::image type="content" source="./media/backup-azure-private-endpoints/deny-public-network.png" alt-text="Screenshot showing how to select the Deny option.":::
46+
47+
>[!Note]
48+
>Once you deny access, you can still access the vault, but you can't move data to/from networks that don't contain private endpoints. For more information, see [Create private endpoints for Azure Backup](#create-private-endpoints-for-azure-backup).
49+
50+
3. Select **Apply** to save the changes.
51+
3552
## Enable Managed Identity for your vault
3653

3754
Managed identities allow the vault to create and use private endpoints. This section talks about enabling the managed identity for your vault.
@@ -218,7 +235,7 @@ Once the private endpoints created for the vault in your VNet have been approved
218235

219236
In the VM in the locked down network, ensure the following:
220237

221-
1. The VM should have access to AAD.
238+
1. The VM should have access to Azure AD.
222239
2. Execute **nslookup** on the backup URL (`xxxxxxxx.privatelink.<geo>.backup.windowsazure.com`) from your VM, to ensure connectivity. This should return the private IP assigned in your virtual network.
223240

224241
### Configure backup

0 commit comments

Comments
 (0)