Skip to content

Commit 30bdc6b

Browse files
committed
Acrolinx
1 parent 32729f6 commit 30bdc6b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

learn-pr/azure/network-fundamentals-2/includes/4-firewalls-network-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,16 +10,16 @@ You need robust security to diagnose and prevent suspicious events, attacks, and
1010

1111
You can use access control to scrutinize every user and client to determine whether they have permission to access your network or its resources. You implement access control by configuring security policies that ensure the user has the right level of permissions assigned to do specific actions on your network. For example, you might want to deny read access for some resources when the user is connecting from outside your on-premises location.
1212

13-
### Antimalware tools
13+
### Anti-malware tools
1414

15-
Antimalware tools protect your network from malicious software (malware). Malware comes in different forms, including:
15+
Anti-malware tools protect your network from malicious software (malware). Malware comes in different forms, including:
1616

1717
- Ransomware
1818
- Viruses
1919
- Spyware
2020
- Trojans
2121

22-
You can use antimalware and antivirus tools to monitor and remedy malware. These tools can detect anomalies in your files, take actions to remove malicious pieces of code, and repair affected resources and devices on your network.
22+
You can use anti-malware and antivirus tools to monitor and remedy malware. These tools can detect anomalies in your files, take actions to remove malicious pieces of code, and repair affected resources and devices on your network.
2323

2424
### Application security
2525

0 commit comments

Comments
 (0)