Skip to content

Commit ce804fa

Browse files
committed
tweak
1 parent a0648e1 commit ce804fa

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/firewall/protect-office-365.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ For each Office 365 product and category, Azure Firewall automatically retrieves
2626
- **Service tag** represents only the required IPv4 addresses and ranges for the specific product and category and can be used in Network Rules to secure traffic to these IP addresses and to any required port.
2727

2828
You should accept a tag being available for a specific combination of product, category and required / not required in the following cases:
29-
1. For a Service Tag – this specific combination exists and has required IPv4 addresses listed.
30-
2. For an FQDN Rule – this specific combination exists and has required FQDNs listed which communicate to ports 80/443.
29+
- For a Service Tag – this specific combination exists and has required IPv4 addresses listed.
30+
- For an FQDN Rule – this specific combination exists and has required FQDNs listed which communicate to ports 80/443.
3131

3232
Tags are updated automatically with any modifications to the required IPv4 addresses and FQDNs. New tags might be created automatically in the future as well if new combinations of product and category are added.
3333

@@ -46,7 +46,7 @@ When you create the rules, ensure you define the required TCP ports (for network
4646
## Limitations
4747

4848
If a specific combination of product, category and required/not required has only FQDNs required, but uses TCP ports that aren't 80/443, an FQDN tag isn't be created for this combination. Application Rules can only cover HTTP, HTTPS or MSSQL. To allow communication to these FQDNs, create your own network rules with these FQDNs and ports.
49-
For more information, see [Use FQDN filtering in network rules](fqdn-filtering-network-rules.md)
49+
For more information, see [Use FQDN filtering in network rules](fqdn-filtering-network-rules.md).
5050

5151
## Next steps
5252

0 commit comments

Comments
 (0)