Skip to content

Commit d2fe624

Browse files
authored
Update vnet-service-endpoint-rule-overview.md
1 parent 744399e commit d2fe624

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-sql/database/vnet-service-endpoint-rule-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ You must already have a subnet that's tagged with the particular virtual network
206206

207207
:::image type="content" source="../../sql-database/media/sql-database-vnet-service-endpoint-rule-overview/portal-firewall-vnet-firewalls-and-virtual-networks.png" alt-text="Azure SQL logical server properties, Firewalls and Virtual Networks highlighted" lightbox="../../sql-database/media/sql-database-vnet-service-endpoint-rule-overview/portal-firewall-vnet-firewalls-and-virtual-networks.png":::
208208

209-
1. Set **Allow azure services and resources to access this server** to **No**.
209+
1. Set **Allow Azure services and resources to access this server** to **No**.
210210

211211
> [!IMPORTANT]
212212
> If you leave the control set to **ON**, your server accepts communication from any subnet inside the Azure boundary. That is communication that originates from one of the IP addresses that's recognized as those within ranges defined for Azure datacenters. Leaving the control set to **ON** might be excessive access from a security point of view. The Microsoft Azure Virtual Network service endpoint feature in coordination with the virtual network rules feature of SQL Database together can reduce your security surface area.

0 commit comments

Comments
 (0)