Skip to content

Commit ea587db

Browse files
committed
Acrolynx and Copilot improvements
1 parent 32c0dd5 commit ea587db

10 files changed

+97
-93
lines changed

articles/storage/blobs/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -301,17 +301,17 @@ items:
301301
href: storage-encrypt-decrypt-blobs-key-vault.md
302302
- name: Networking
303303
items:
304-
- name: Network security overview
304+
- name: Network security
305305
href: ../common/storage-network-security-overview.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
306306
- name: Private endpoints
307307
href: ../common/storage-private-endpoints.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
308-
- name: Public endpoints
308+
- name: Public endpoint
309309
items:
310310
- name: Default access level
311311
href: ../common/storage-network-security-set-default-access.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
312312
- name: Firewall rules
313313
items:
314-
- name: Firewall rules overview
314+
- name: Firewall rules
315315
href: ../common/storage-network-security.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
316316
- name: Guidelines and limitations
317317
href: ../common/storage-network-security-limitations.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json

articles/storage/common/storage-network-security-ip-address-range.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: normesta
1212

1313
# Create an IP network rule for Azure Storage
1414

15-
You can deny all public access to your storage account, and then configure Azure network settings to accept requests from specific IP address ranges. To enable traffic from a specific public IP address ranges, create one or more IP network rules. To learn more, see [Permit access to IP address ranges](storage-network-security.md#grant-access-from-an-internet-ip-range).
15+
You can deny all public access to your storage account and then configure Azure network settings to accept requests from specific IP address ranges. To enable traffic from specific public IP address ranges, create one or more IP network rules. To learn more, see [Permit access to IP address ranges](storage-network-security.md#grant-access-from-an-internet-ip-range).
1616

1717
## Create an IP network rule
1818

@@ -22,7 +22,7 @@ You can deny all public access to your storage account, and then configure Azure
2222

2323
2. In the service menu, under **Security + networking**, select **Networking**.
2424

25-
3. To allow traffic from IP address ranges, make sure that **Enabled from selected virtual networks and IP addresses** is selected.
25+
3. To allow traffic from IP address ranges, make sure that **Enabled from selected virtual networks and IP addresses** is selected.
2626

2727
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **Firewall** > **Address Range**.
2828

@@ -34,7 +34,7 @@ You can deny all public access to your storage account, and then configure Azure
3434

3535
1. Install [Azure PowerShell](/powershell/azure/install-azure-powershell) and [sign in](/powershell/azure/authenticate-azureps).
3636

37-
2. To allow traffic to IP address ranges, use the `Update-AzStorageAccountNetworkRuleSet` command and set the `-DefaultAction` parameter to `Deny`:
37+
2. To allow traffic from IP address ranges, use the `Update-AzStorageAccountNetworkRuleSet` command and set the `-DefaultAction` parameter to `Deny`:
3838

3939
```powershell
4040
Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -DefaultAction Deny
@@ -77,7 +77,6 @@ You can deny all public access to your storage account, and then configure Azure
7777
7878
1. Install the [Azure CLI](/cli/azure/install-azure-cli) and [sign in](/cli/azure/authenticate-azure-cli).
7979
80-
8180
2. To allow traffic from IP address ranges, use the `az storage account update` command and set the `--default-action` parameter to `Deny`:
8281
8382
```azurecli

articles/storage/common/storage-network-security-limitations.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,15 @@ ms.author: normesta
1313

1414
# Guidelines and limitations for the Azure Storage firewall
1515

16-
Before you implement network security for your storage accounts, review the important restrictions and considerations discussed in this section.
16+
Before you implement network security for your storage accounts, review the important restrictions and considerations in this section.
1717

1818
## General guidelines and limitations
1919

20-
- Azure Storage firewall rules apply only to [data plane](../../azure-resource-manager/management/control-plane-and-data-plane.md#data-plane) operations. [Control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md#control-plane) operations are not subject to the restrictions specified in firewall rules.
20+
- Azure Storage firewall rules apply only to [data plane](../../azure-resource-manager/management/control-plane-and-data-plane.md#data-plane) operations. [Control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md#control-plane) operations aren't subject to the restrictions specified in firewall rules.
2121

2222
- To access data by using tools such as the Azure portal, Azure Storage Explorer, and AzCopy, you must be on a machine within the trusted boundary that you establish when configuring network security rules.
2323

24-
Some operations, such as blob container operations, can be performed through both the control plane and the data plane. So if you attempt to perform an operation such as listing containers from the Azure portal, the operation will succeed unless it is blocked by another mechanism. Attempts to access blob data from an application such as Azure Storage Explorer are controlled by the firewall restrictions.
24+
Some operations, such as blob container operations, can be performed through both the control plane and the data plane. If you attempt to perform an operation such as listing containers from the Azure portal, the operation succeeds unless it's blocked by another mechanism. Attempts to access blob data from an application such as Azure Storage Explorer are controlled by the firewall restrictions.
2525

2626
For a list of data plane operations, see the [Azure Storage REST API Reference](/rest/api/storageservices/).
2727

@@ -31,13 +31,13 @@ Before you implement network security for your storage accounts, review the impo
3131

3232
- Network rules don't affect virtual machine (VM) disk traffic, including mount and unmount operations and disk I/O, but they do help protect REST access to page blobs.
3333

34-
- You can use unmanaged disks in storage accounts with network rules applied to back up and restore VMs by [creating an exception](storage-network-security.md#manage-exceptions). Firewall exceptions aren't applicable to managed disks, because Azure already manages them.
34+
- You can use unmanaged disks in storage accounts with network rules applied to back up and restore VMs by [creating an exception](storage-network-security.md#manage-exceptions). Firewall exceptions don't apply to managed disks because Azure already manages them.
3535

36-
- If you delete a subnet that's included in a virtual network rule, it will be removed from the network rules for the storage account. If you create a new subnet by the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
36+
- If you delete a subnet that's included in a virtual network rule, it is removed from the network rules for the storage account. If you create a new subnet with the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
3737

38-
- When referencing a service endpoint in a client application, it's recommended that you avoid taking a dependency on a cached IP address. The storage account IP address is subject to change, and relying on a cached IP address may result in unexpected behavior. Additionally, it's recommended that you honor the time-to-live (TTL) of the DNS record and avoid overriding it. Overriding the DNS TTL may result in unexpected behavior.
38+
- When referencing a service endpoint in a client application, we recommend that you avoid taking a dependency on a cached IP address. The storage account IP address is subject to change, and relying on a cached IP address might result in unexpected behavior. Additionally, we recommend that you honor the time-to-live (TTL) of the DNS record and avoid overriding it. Overriding the DNS TTL might result in unexpected behavior.
3939

40-
- By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](storage-network-security.md#grant-access-from-azure-resource-instances) and [exceptions](storage-network-security.md#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](storage-network-security.md#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
40+
- By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](storage-network-security.md#grant-access-from-azure-resource-instances) and [exceptions](storage-network-security.md#manage-exceptions) that you previously configured, including **Allow Azure services on the trusted services list to access this storage account**, will remain in effect. As a result, those resources and services might still have access to the storage account.
4141

4242
## Restrictions for IP network rules
4343

@@ -47,17 +47,17 @@ Before you implement network security for your storage accounts, review the impo
4747

4848
- You must provide allowed internet address ranges by using [CIDR notation](https://tools.ietf.org/html/rfc4632) in the form 16.17.18.0/24 or as individual IP addresses like 16.17.18.19.
4949

50-
- Small address ranges that use /31 or /32 prefix sizes are not supported. Configure these ranges by using individual IP address rules.
50+
- Small address ranges that use /31 or /32 prefix sizes aren't supported. Configure these ranges using individual IP address rules.
5151

5252
- Only IPv4 addresses are supported for configuration of storage firewall rules.
5353

54-
- You can't use IP network rules to restrict access to clients in same Azure region as the storage account. IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use [Virtual network rules](storage-network-security-virtual-networks.md) to allow same-region requests.
54+
- You can't use IP network rules to restrict access to clients in the same Azure region as the storage account. IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use [Virtual network rules](storage-network-security-virtual-networks.md) to allow same-region requests.
5555

56-
- You can't use IP network rules to o restrict access to clients in a [paired region](../../reliability/cross-region-replication-azure.md) that are in a virtual network that has a service endpoint.
56+
- You can't use IP network rules to restrict access to clients in a [paired region](../../reliability/cross-region-replication-azure.md) that are in a virtual network with a service endpoint.
5757

5858
- You can't use IP network rules to restrict access to Azure services deployed in the same region as the storage account.
5959

60-
Services deployed in the same region as the storage account use private Azure IP addresses for communication. So, you can't restrict access to specific Azure services based on their public outbound IP address range.
60+
Services deployed in the same region as the storage account use private Azure IP addresses for communication. Therefore, you can't restrict access to specific Azure services based on their public outbound IP address range.
6161

6262
## Next steps
6363

articles/storage/common/storage-network-security-manage-exceptions.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,21 @@ ms.author: normesta
1111

1212
---
1313

14-
# Manage network security exceptions
14+
# Manage network security exceptions for Azure Storage
1515

16-
You can enable traffic from an Azure service outside of the network boundary by adding a *network security exception*.
16+
You can enable traffic from Azure services outside of your network boundary by adding a *network security exception*.
1717

1818
For a complete list of trusted Azure services, see [Trusted Azure services](storage-network-security-trusted-azure-services.md).
1919

2020
## Add a network security exception
2121

2222
### [Portal](#tab/azure-portal)
2323

24-
1. Go to the storage account for which you want to manage exceptions.
24+
1. Navigate to the storage account for which you want to manage exceptions.
2525

2626
2. In the service menu, under **Security + networking**, select **Networking**.
2727

28-
3. Check that you've chosen to enable public network access from selected virtual networks and IP addresses.
28+
3. Verify that you've chosen to enable public network access from selected virtual networks and IP addresses.
2929

3030
4. Under **Exceptions**, select the exceptions that you want to grant.
3131

@@ -35,19 +35,18 @@ For a complete list of trusted Azure services, see [Trusted Azure services](stor
3535

3636
1. Install [Azure PowerShell](/powershell/azure/install-azure-powershell) and [sign in](/powershell/azure/authenticate-azureps).
3737

38-
2. Display the exceptions for the storage account's network rules:
38+
2. Display the exceptions for the storage account network rules:
3939

4040
```powershell
4141
(Get-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount").Bypass
4242
```
4343
44-
3. Configure the exceptions to the storage account's network rules:
44+
3. Configure the exceptions for the storage account network rules:
4545
46-
```powershell
47-
Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -Bypass AzureServices,Metrics,Logging
46+
```powershell Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -Bypass AzureServices,Metrics,Logging
4847
```
4948
50-
4. Remove the exceptions to the storage account's network rules:
49+
4. Remove the exceptions from the storage account network rules:
5150
5251
```powershell
5352
Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -Bypass None
@@ -57,19 +56,18 @@ For a complete list of trusted Azure services, see [Trusted Azure services](stor
5756
5857
1. Install the [Azure CLI](/cli/azure/install-azure-cli) and [sign in](/cli/azure/authenticate-azure-cli).
5958
60-
2. Display the exceptions for the storage account's network rules:
59+
2. Display the exceptions for the storage account network rules:
6160
6261
```azurecli
6362
az storage account show --resource-group "myresourcegroup" --name "mystorageaccount" --query networkRuleSet.bypass
6463
```
6564
66-
3. Configure the exceptions to the storage account's network rules:
65+
3. Configure the exceptions for the storage account network rules:
6766
68-
```azurecli
69-
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --bypass Logging Metrics AzureServices
67+
```azurecli az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --bypass Logging Metrics AzureServices
7068
```
7169
72-
4. Remove the exceptions to the storage account's network rules:
70+
4. Remove the exceptions from the storage account network rules:
7371
7472
```azurecli
7573
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --bypass None

0 commit comments

Comments
 (0)