Skip to content

Commit f252f3e

Browse files
committed
add caution about disabling public network access and trusted svcs
1 parent 1c10cca commit f252f3e

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: jimmart-dev
66
ms.service: storage
77
ms.topic: how-to
8-
ms.date: 03/31/2022
8+
ms.date: 10/03/2022
99
ms.author: jammart
1010
ms.reviewer: santoshc
1111
ms.subservice: common
@@ -51,7 +51,7 @@ By default, storage accounts accept connections from clients on any network. You
5151

5252
> [!WARNING]
5353
> Changing this setting can impact your application's ability to connect to Azure Storage. Make sure to grant access to any allowed networks or set up access through a [private endpoint](storage-private-endpoints.md) before you change this setting.
54-
54+
5555
### [Portal](#tab/azure-portal)
5656

5757
1. Go to the storage account you want to secure.
@@ -120,6 +120,9 @@ By default, storage accounts accept connections from clients on any network. You
120120
121121
---
122122
123+
> [!CAUTION]
124+
> If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [**Resource instances**](#grant-access-from-azure-resource-instances) and **Exceptions** you previously configured, including [**Allow Azure services on the trusted services list to access this storage account.**](#grant-access-to-trusted-azure-services), will remain in effect.
125+
123126
## Grant access from a virtual network
124127
125128
You can configure storage accounts to allow access only from specific subnets. The allowed subnets may belong to a VNet in the same subscription, or those in a different subscription, including subscriptions belonging to a different Azure Active Directory tenant.

0 commit comments

Comments
 (0)