Skip to content

Commit fb66705

Browse files
author
Michael Bender
committed
removed NIP section
1 parent f8be215 commit fb66705

File tree

1 file changed

+0
-5
lines changed

1 file changed

+0
-5
lines changed

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -73,11 +73,6 @@ Security admin rules are similar to NSG rules in structure and the parameters th
7373
| **Security Admin Rules** | Network admins, central governance team | Virtual networks | Higher priority | Allow, Deny, Always Allow | Priority, protocol, action, source, destination |
7474
| **NSG Rules** | Individual teams | Subnets, NICs | Lower priority, after security admin rules | Allow, Deny | Priority, protocol, action, source, destination |
7575

76-
## Network intent policies and security admin rules
77-
78-
A network intent policy is applied to some network services to ensure the network traffic is working as needed for these services. By default, a security admin configuration will not apply security admin rules to virtual networks with services that use network intent policies such as SQL managed instance service. With this default option, if you deploy a service using network intent policies in a virtual network with existing security admin rules applied, those security admin rules will be removed from those virtual networks. You can also elect for your security admin configuration to handle virtual networks with services that use network intent policies differently to instead apply security admin rules to those virtual networks unless the security admin rule is of a "deny" action type. With either option, your security admin rules will not block traffic to or from virtual networks with services that use network intent policies, ensuring that these services continue to function as expected.
79-
80-
If you need to apply security admin rules on virtual networks with services that use network intent policies, contact [email protected] to enable this functionality. Overriding the default behavior described above could break the network intent policies created for those services. For example, creating a deny admin rule can block some traffic allowed by the SQL managed instance service, which is defined by their network intent policies. Make sure to review your environment before applying a security admin configuration. For an example of how to allow the traffic of services that use network intent policies, see [How can I explicitly allow SQLMI traffic before having deny rules](faq.md#how-can-i-explicitly-allow-azure-sql-managed-instance-traffic-before-having-deny-rules)
8176
## Security admin fields
8277

8378
When you define a security admin rule, there are required and optional fields.

0 commit comments

Comments
 (0)