You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security-overview.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,13 +24,11 @@ By default, storage accounts accept requests over HTTPS only. Any requests made
24
24
25
25
## Private endpoints
26
26
27
-
Where possible, create private links to your storage account to secure access through a *private endpoint*. A private endpoint assigns a private IP address from your virtual network to your storage account. Clients connect to your storage account using the private link. Traffic is routed over the Microsoft backbone network, ensuring it doesn't travel over the public internet. You can fine-tune access rules using [Network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md). To permit traffic only from private links, you can block all access over the public endpoint. Private endpoints incur extra costs but provide maximum network isolation.
28
-
29
-
To learn more about using a private endpoint to secure traffic to your storage account, see [Use private endpoints for Azure Storage](storage-private-endpoints.md).
27
+
Where possible, create private links to your storage account to secure access through a *private endpoint*. A private endpoint assigns a private IP address from your virtual network to your storage account. Clients connect to your storage account using the private link. Traffic is routed over the Microsoft backbone network, ensuring it doesn't travel over the public internet. You can fine-tune access rules using [Network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md). To permit traffic only from private links, you can block all access over the public endpoint. Private endpoints incur extra costs but provide maximum network isolation. To learn more, see [Use private endpoints for Azure Storage](storage-private-endpoints.md).
30
28
31
29
## Public endpoints
32
30
33
-
The *public endpoint* of your storage account is accessed through a public IP address. If you block all access over the public endpoint, you disable all traffic to the storage account's public IP address. However, if there are clients that can't access your storage account over a private link, or if you choose not to use private endpoints for cost or other reasons, then you can secure the public endpoint of your storage account by using firewall rules or by adding your storage account to a network security perimeter.
31
+
The *public endpoint* of your storage account is accessed through a public IP address. If you use only private endpoints, then you should disable all traffic to the storage account's public IP address. If some clients use a private link, or you choose not to use private endpoints for cost or other reasons, then you can secure the public endpoint of your storage account by using firewall rules or by adding your storage account to a network security perimeter.
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security-trusted-azure-services.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,11 +13,14 @@ ms.author: normesta
13
13
14
14
# Trusted Azure services
15
15
16
+
<aid="trusted-microsoft-services"></a>
17
+
16
18
If you need to enable traffic from an Azure service outside of your network boundary, you can add a *network security exception*. This is useful when an Azure service operates from a network that you can't include in your virtual network or IP network rules. For example, some services might need to read resource logs and metrics in your account. You can allow read access for log files, metrics tables, or both by creating a network rule exception. These services connect to your storage account using strong authentication.
17
19
18
20
To learn how to add a network security exception, see [Manage Network security exceptions](storage-network-security-manage-exceptions.md).
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,6 @@ The following table describes each type of service endpoint that you can enable
50
50
51
51
To learn how to configure a virtual network rule and enable service endpoints, see [Create a virtual network rule for Azure Storage](storage-network-security-virtual-networks.md).
Service endpoints also work between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md).
@@ -61,6 +58,9 @@ Configuring service endpoints between virtual networks and service instances in
61
58
62
59
When planning for disaster recovery during a regional outage, create the virtual networks in the paired region in advance. Enable service endpoints for Azure Storage with network rules that grant access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
For clients and services that aren't located in a virtual network, you can enable traffic by creating *IP network rules*. Each IP network rule enables traffic from a specific public IP address range. For example, if a client from an on-premises network needs to access storage data, you can create a rule that includes the public IP address of that client. Each storage account supports up to **400** IP network rules.
@@ -94,11 +94,7 @@ To learn how to configure a resource instance rule, see [Create a resource insta
0 commit comments