Skip to content

Commit d4ce205

Browse files
committed
edit
1 parent 0e2e3f4 commit d4ce205

File tree

1 file changed

+17
-8
lines changed

1 file changed

+17
-8
lines changed

articles/dns/dns-security-policy.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ A security policy can only apply to VNets in the same region. You can create any
4646
4747
## DNS traffic rules
4848

49-
DNS traffic rules determine the action that is taken for a DNS query. Rules can be enabled or disabled.
49+
DNS traffic rules determine the action that is taken for a DNS query.
5050

5151
To display DNS traffic rules in the Azure portal, select a DNS security policy and then under **Settings**, select **DNS Traffic Rules**. See the following example:
5252

@@ -59,29 +59,38 @@ To display DNS traffic rules in the Azure portal, select a DNS security policy a
5959
- During preview, up to 10 traffic rules are allowed per security policy. This limit will be increased to 100 for general availability.
6060
- Multiple **DNS Domain Lists** are allowed per rule. You must have at least one DNS domain list.
6161
- Each rule is associated with one of three **Traffic Actions**: **Allow**, **Block**, or **Alert**.
62-
* Allow: Permit the query to the associated domain lists and log the query.
63-
* Block: Block the query to the associated domain lists and log the block action.
64-
* Alert: Permit the query to the associated domain lists and log an alert.
62+
* **Allow**: Permit the query to the associated domain lists and log the query.
63+
* **Block**: Block the query to the associated domain lists and log the block action.
64+
* **Alert**: Permit the query to the associated domain lists and log an alert.
6565
- Rules can be individually **Enabled** or **Disabled**.
6666

6767
## Virtual network links
6868

69-
DNS security policies only apply to VNets that are linked to the security policy. You can link a single security policy to multiple VNets, however a single VNet can only be linked to one DNS security policy. See the following example.
69+
DNS security policies only apply to VNets that are linked to the security policy. You can link a single security policy to multiple VNets, however a single VNet can only be linked to one DNS security policy.
70+
71+
The following example shows a DNS security policy linked to two VNets (**myeastvnet-40**, **myeastvnet-50**):
7072

7173
[ ![Screenshot of the list of virtual network links.](./media/dns-security-policy/virtual-network-links.png) ](./media/dns-security-policy/virtual-network-links.png#lightbox)
7274

73-
You can only link VNets that are in the same region as the security policy. When you link a VNet to a DNS security policy using a virtual network link, the DNS security policy applies to all resources inside the VNet.
75+
- You can only link VNets that are in the same region as the security policy.
76+
- When you link a VNet to a DNS security policy using a virtual network link, the DNS security policy applies to all resources inside the VNet.
7477

7578
## DNS domain lists
7679

77-
DNS domain lists are lists of DNS domains that you associate to traffic rules. Select **DNS Domain Lists** under **Settings** for a DNS security policy to view the current domain lists associated with the policy. See the following example:
80+
DNS domain lists are lists of DNS domains that you associate to traffic rules. Select **DNS Domain Lists** under **Settings** for a DNS security policy to view the current domain lists associated with the policy.
81+
82+
The following example shows the DNS domain lists that are associated with the DNS security policy **myeast-secpol**:
7883

7984
[ ![Screenshot of the list of DNS domain lists.](./media/dns-security-policy/domain-list.png) ](./media/dns-security-policy/domain-list.png#lightbox)
8085

81-
You can associate a domain list to multiple DNS traffic rules in different security policies.
86+
You can associate a domain list to multiple DNS traffic rules in different security policies. A security policy must contain at least one domain list.
87+
88+
The following is an example of a DNS domain list (**blocklist-1**) that contains two domains (**malicious.contoso.com**, **exploit.adatum.com**):
8289

8390
![Screenshot of domains inside a domain list.](./media/dns-security-policy/domain-list-detailed.png)
8491

92+
- A DNS domain list must contain at least one domain. Wildcard domains are allowed.
93+
8594
> [!IMPORTANT]
8695
> Be careful when creating wildcard domain lists. For example, if you create a domain list that applies to all domains (by entering `.` as the DNS domain) and then configure a DNS traffic rule to block queries to this domain list, you can prevent required services from working.
8796

0 commit comments

Comments
 (0)