Skip to content

Commit fb8459e

Browse files
committed
Line edits
1 parent 8d4e398 commit fb8459e

File tree

6 files changed

+9
-10
lines changed

6 files changed

+9
-10
lines changed

learn-pr/azure/intro-to-azure-bastion/5-knowledge-check.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,12 +41,12 @@ quiz:
4141
- content: "They must deploy Azure Bastion in a different virtual network from the one that contains the VMs."
4242
isCorrect: false
4343
explanation: "Incorrect. Azure Bastion must be in the same virtual network as the managed VMs."
44-
- content: "They must deploy Azure Bastion in the same virtual network as the one that contains the VMs, and in the same subnet."
44+
- content: "They must deploy Azure Bastion in the same virtual network as the one that contains the VMs and in the same subnet."
4545
isCorrect: false
4646
explanation: "Incorrect. Although Azure Bastion should be deployed in the same virtual network, it must be in a different subnet."
47-
- content: "They must deploy Azure Bastion in the same virtual network as the one that contains the VMs, and in a different subnet."
47+
- content: "They must deploy Azure Bastion in the same virtual network as the one that contains the VMs and in a different subnet."
4848
isCorrect: true
49-
explanation: "Correct. Azure Bastion must be deployed in the same virtual network (or peered virtual network) as the VMs, but in its own subnet."
49+
explanation: "Correct. Azure Bastion must be deployed in the same virtual network (or peered virtual network) as the VMs but in its own subnet."
5050
- content: "Your boss is concerned that by implementing Azure Bastion, you need to maintain it with patches and updates. Is your boss correct?"
5151
choices:
5252
- content: "No, your boss is wrong. Azure Bastion is a fully managed PaaS service that you don't need to patch or update."

learn-pr/azure/intro-to-azure-bastion/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Server administrators understand that it's efficient to remotely administer and
66

77
Suppose you have a line-of-business (LOB) app that supports your organization's research department. In the past, this app ran on a couple of Windows Server computers in your head office datacenter. Whenever you needed to administer the app, you connected using Remote Desktop Protocol (RDP) over TCP port **3389**. You also used Secure Shell (SSH), over port **22**, to administer the VMs. Because the app was hosted on a computing resource in a private datacenter, you had some concerns about access from malicious hackers over the internet. However, the app now runs on VMs hosted in Azure.
88

9-
To connect to the VMs, you must now expose a public IP address on each VM for your RDP/SSH connections. However, potential protocol vulnerabilities make this type of connection undesirable. As a solution, you could use a jump box VM to act as an intermediary between your management console and the target VMs. Or, you could consider implementing Azure Bastion.
9+
To connect to the VMs, you must now expose a public IP address on each VM for your RDP/SSH connections. However, potential protocol vulnerabilities make this type of connection undesirable. As a solution, you could use a jump box VM to act as an intermediary between your management console and the target VMs. Alternatively, you could consider implementing Azure Bastion.
1010

1111
:::image type="content" source="../media/remote-admin.png" alt-text="A remote administrator connecting with RDP or SSH through the internet to Azure VMs. The VMs are accessible through a public IP address using port 3389 or port 22.":::
1212

learn-pr/azure/intro-to-azure-bastion/includes/2-what-is-azure-bastion.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ It's vital to be able to securely administer and manage remote hosted VMs. To be
44

55
Secure remote management is the ability to connect to a remote resource without exposing that resource to security risks. This type of connection can sometimes be challenging, especially if the resource is being accessed across the internet.
66

7-
When administrators connect to remote VMs, they typically use either RDP or SSH to achieve their administrative goals. The problem is, to connect to a hosted VM, you must connect to its public IP address. However, exposing the IP ports used by RDP and SSH (**3389** and **22**) to the internet is highly undesirable, because it presents significant security risks.
7+
When administrators connect to remote VMs, they typically use either RDP or SSH to achieve their administrative goals. The problem is, to connect to a hosted VM, you must connect to its public IP address. However, exposing the IP ports used by RDP and SSH (**3389** and **22**) to the internet is highly undesirable because it presents significant security risks.
88

99
## Azure Bastion definition
1010

@@ -25,15 +25,15 @@ The following table describes the features that are available after you deploy A
2525
|No hassle of managing Network Security Groups (NSGs)| You don't need to apply any NSGs to the Azure Bastion subnet. Because Azure Bastion connects to your virtual machines over private IP, you can configure your NSGs to allow RDP/SSH from Azure Bastion only. This removes the hassle of managing NSGs each time you need to securely connect to your virtual machines.|
2626
|No need to manage a separate bastion host on a VM |Azure Bastion is a fully managed platform PaaS service from Azure that is hardened internally to provide you secure RDP/SSH connectivity.|
2727
|Protection against port scanning|Your VMs are protected against port scanning by rogue and malicious users because you don't need to expose the VMs to the internet.|
28-
|Hardening in one place only|Azure Bastion sits at the perimeter of your virtual network, so you dont need to worry about hardening each of the VMs in your virtual network.|
28+
|Hardening in one place only|Azure Bastion sits at the perimeter of your virtual network, so you don't need to worry about hardening each of the VMs in your virtual network.|
2929
|Protection against zero-day exploits |The Azure platform protects against zero-day exploits by keeping the Azure Bastion hardened and always up to date for you.|
3030

3131
## How to avoid exposing remote management ports
3232

3333
By implementing Azure Bastion, you can manage the Azure VMs within a configured Azure virtual network by using either RDP or SSH, without needing to expose those management ports to the public internet. By using Azure Bastion, you can:
3434

3535
- Connect easily to your Azure VMs. Connect your RDP and SSH sessions directly in the Azure portal.
36-
- Avoid exposing management ports to the internet. Sign in to your Azure VMs and avoid public internet exposure by using SSH and RDP with private IP addresses only.
36+
- Avoid exposing management ports to the internet. Sign in to your Azure VMs, and avoid public internet exposure by using SSH and RDP with private IP addresses only.
3737
- Avoid extensive reconfiguration of your existing network infrastructure. Integrate and traverse existing firewalls and security perimeters by using a modern HTML5-based web client over TLS on port **443**.
3838
- Simplify sign in. Use your SSH keys for authentication when signing in to your Azure VMs.
3939

learn-pr/azure/intro-to-azure-bastion/includes/3-how-azure-bastion-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The following diagram depicts the architecture of a typical Azure Bastion deploy
1616
:::image type="content" source="../media/bastion-architecture.png" alt-text="The architecture of Azure Bastion, as described in the preceding text.":::
1717

1818
> [!NOTE]
19-
> The protected VMs and the Azure Bastion host are connected to the same virtual network, although in different subnets.
19+
> The protected VMs and the Azure Bastion host are connected to the same virtual network, although in different subnets.
2020
2121
The typical connection process in Azure Bastion is as follows:
2222

learn-pr/azure/intro-to-azure-bastion/includes/4-when-to-use-azure-bastion.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,6 @@ To determine whether a jump box or Azure Bastion is the better option to remotel
3434
| **Ease of management** | Azure Bastion is a fully managed PaaS service. It's not a VM like a jump box, which requires regular updates. You don't need a client or agent to use Azure Bastion, nor do you need to apply patches and updates to it. You also don't need to install or maintain any other software on management consoles.|
3535
| **Integration** | You can integrate Azure Bastion with other native security services in Azure, such as Azure Firewall. Jump servers don't have this option. |
3636

37-
3837
> [!NOTE]
3938
> You deploy Azure Bastion per virtual network (or peered virtual network) rather than per subscription, account, or VM.
4039

learn-pr/azure/intro-to-azure-bastion/includes/6-summary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,4 +21,4 @@ You should now be able to determine how you can use Azure Bastion to help secure
2121

2222
- [Azure Bastion](https://azure.microsoft.com/services/azure-bastion?azure-portal=true)
2323
- [Azure Bastion pricing](https://azure.microsoft.com/pricing/details/azure-bastion?azure-portal=true)
24-
- [Quickstart: Deploy Azure Bastion with default settings](/azure/bastion/quickstart-host-portal?azure-portal=true)
24+
- [Quickstart: Deploy Azure Bastion automatically](/azure/bastion/quickstart-host-portal?azure-portal=true)

0 commit comments

Comments
 (0)