Skip to content

Commit 7af3a3a

Browse files
committed
Image Updates
1 parent 7704169 commit 7af3a3a

13 files changed

+5
-196
lines changed

learn-pr/advocates/prevent-azure-machine-learning-data-exfiltration/includes/1-prevent-data-exfiltration-azure-ai-workloads.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ Exfiltration poses significant risks to organizations, including potential breac
44

55
A strategy to prevent data exfiltration involves applying security controls to all resources in an AI workload. In this module we focus specifically on the security controls and configuration you can apply to Azure AI services and Azure Machine Learning to address attempts at exfiltration.
66

7-
[![Diagram of a high security tenant transferring data to a low security tenant that then has access to output data to untrusted data sources.](../media/exfiltration-inbound-outbound.svg)](../media/exfiltration-inbound-outbound.svg#lightbox)
7+
[![Diagram of a high security tenant transferring data to a low security tenant that then has access to output data to untrusted data sources.](../media/exfiltration-inbound-outbound.svg)](../media/exfiltration-inbound-outbound.png#lightbox)

learn-pr/advocates/prevent-azure-machine-learning-data-exfiltration/includes/2-exfiltration-prevention-azure-ai-services.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You can use Cloud Shell to configure exfiltration protection for Azure AI servic
2929
az cognitiveservices account show -g "myResourceGroup" -n "Account Name" | grep Network Access
3030
```
3131
32-
[![Screenshot that displays output of command checking status of cognitive services.](../media/show-exfiltration-configuration.svg)](../media/show-exfiltration-configuration-big.svg#lightbox)
32+
[![Screenshot that displays output of command checking status of cognitive services.](../media/show-exfiltration-configuration.svg)](../media/show-exfiltration-configuration-big.png#lightbox)
3333
3434
1. The result of this command informs you if public network access is enabled for the service and if any outbound restrictions are set.
3535
1. Check to see if there's a Fully Qualified Domain Name list of allowed addresses.
@@ -61,4 +61,4 @@ You can use Cloud Shell to configure exfiltration protection for Azure AI servic
6161
6262
1. The output shows Microsoft.com in the allowed FQDN list.
6363
64-
[![Screenshot showing the contents of the output text file in the editor.](../media/editor-list.svg)](../media/editor-list-big.svg#lightbox)
64+
[![Screenshot showing the contents of the output text file in the editor.](../media/editor-list.svg)](../media/editor-list-big.png#lightbox)

learn-pr/advocates/prevent-azure-machine-learning-data-exfiltration/includes/3-azure-machine-learning-data-exfiltration-prevention.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Service endpoint policies let you filter virtual network traffic to specific Azu
2727
1. Select **Add** to add the resource information.
2828
1. Select **+Add an alias** and then select _/services/Azure/MachineLearning_ as the Server Alias value. Select **Add** to add the alias.
2929

30-
[![A screenshot showing the configuration of a service endpoint policy in the Azure portal.](../media/service-endpoint-policy.svg)](../media/service-endpoint-policy-big.svg#lightbox)
30+
[![A screenshot showing the configuration of a service endpoint policy in the Azure portal.](../media/service-endpoint-policy.svg)](../media/service-endpoint-policy-big.png#lightbox)
3131

3232
1. Select **Review + Create, then Create**
3333

@@ -66,4 +66,4 @@ Use the following steps to enable a storage endpoint for the subnet that contain
6666
1. In the form that appears, expand the **Services** dropdown and then enable **Microsoft.Storage**. Select **Save** to save these changes.
6767
1. Apply the service endpoint policy to your workspace subnet.
6868

69-
[![A screenshot showing the edit subnet option in the Azure Portal.](../media/edit-subnet.svg)](../media/edit-subnet-big.svg#lightbox)
69+
[![A screenshot showing the edit subnet option in the Azure Portal.](../media/edit-subnet.svg)](../media/edit-subnet-big.png#lightbox)
933 KB
Loading

learn-pr/advocates/prevent-azure-machine-learning-data-exfiltration/media/edit-subnet-big.svg

Lines changed: 0 additions & 25 deletions
This file was deleted.
1.37 MB
Loading

learn-pr/advocates/prevent-azure-machine-learning-data-exfiltration/media/editor-list-big.svg

Lines changed: 0 additions & 54 deletions
This file was deleted.
351 KB
Loading

learn-pr/advocates/prevent-azure-machine-learning-data-exfiltration/media/exfiltration-inbound-outbound-big.svg

Lines changed: 0 additions & 25 deletions
This file was deleted.
454 KB
Loading

0 commit comments

Comments
 (0)