Skip to content

Commit e72f899

Browse files
authored
Merge pull request #74262 from vhorne/fw-fqdn
tweak
2 parents c92b3a7 + 278fc71 commit e72f899

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/firewall/fqdn-tags.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 4/22/2019
8+
ms.date: 4/23/2019
99
ms.author: victorh
1010
---
1111

@@ -30,7 +30,7 @@ The following table shows the current FQDN tags you can use. Microsoft maintains
3030
|Microsoft Active Protection Service (MAPS)|Allow outbound access to [MAPS](https://cloudblogs.microsoft.com/enterprisemobility/2016/05/31/important-changes-to-microsoft-active-protection-service-maps-endpoint/).|
3131
|App Service Environment (ASE)|Allows outbound access to ASE platform traffic. This tag doesn’t cover customer-specific Storage and SQL endpoints created by ASE. These should be enabled via [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or added manually.<br><br>For more information about integrating Azure Firewall with ASE, see [Locking down an App Service Environment](../app-service/environment/firewall-integration.md#configuring-azure-firewall-with-your-ase).|
3232
|Azure Backup|Allows outbound access to the Azure Backup services.|
33-
|Azure HDInsight<br>(Preview)|Allows outbound access for HDInsight platform traffic. This tag doesn’t cover customer-specific Storage or SQL traffic from HDInsight. These are enabled via [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or added manually.|
33+
|Azure HDInsight<br>(Preview)|Allows outbound access for HDInsight platform traffic. This tag doesn’t cover customer-specific Storage or SQL traffic from HDInsight. Enable these using [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or add them manually.|
3434

3535
> [!NOTE]
3636
> When selecting FQDN Tag in an application rule, the protocol:port field must be set to **https**.

0 commit comments

Comments
 (0)