Skip to content

Commit 4b19a32

Browse files
Merge pull request #306783 from MicrosoftDocs/main
Auto Publish – main to live - 2025-10-10 11:00 UTC
2 parents d79d057 + ffa814f commit 4b19a32

3 files changed

Lines changed: 1 addition & 13 deletions

File tree

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -169,17 +169,6 @@ A list of all Azure CLI references for Private Link Configuration on Application
169169

170170
After registering the feature, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal.
171171

172-
## Resource Changes
173-
174-
After your gateway is provisioned, a resource tag is automatically assigned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
175-
176-
![Screenshot of the EnhancedNetworkControl tag.](./media/application-gateway-private-deployment/tags.png)
177-
178-
The resource tag is cosmetic, and serves to confirm that the gateway has been provisioned with the capabilities to configure any combination of the private only gateway features. Modification or deletion of the tag or value doesn't change any functional workings of the gateway.
179-
180-
> [!TIP]
181-
> The **EnhancedNetworkControl** tag can be helpful when existing Application Gateways were deployed in the subscription prior to feature enablement and you would like to differentiate which gateway can utilize the new functionality.
182-
183172
## Application Gateway Subnet
184173

185174
Application Gateway Subnet is the subnet within the Virtual Network where the Application Gateway Resources will be deployed. In the Frontend Private Ip configuration, is important that this subnet can reach privately the resources that want to connect to your exposed app or site.

articles/azure-app-configuration/quickstart-deployment-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ You can manage App Configuration data, such as key-values and snapshots, in depl
4747
- Data access can be attributed to the deployment caller for auditing purposes.
4848

4949
> [!IMPORTANT]
50-
> App Configuration control plane API version `2023-08-01-preview` or later is required to configure the Azure Resource Manager authentication mode by using an [ARM template](./quickstart-resource-manager.md), [Bicep](./quickstart-bicep.md), or the REST API. For REST API examples, see the [azure-rest-api-specs](https://github.com/Azure/azure-rest-api-specs/blob/main/specification/appconfiguration/resource-manager/Microsoft.AppConfiguration/preview/2023-08-01-preview/examples/ConfigurationStoresCreateWithDataPlaneProxy.json) GitHub repo.
50+
> App Configuration control plane API version `2023-08-01-preview` or later is required to configure the Azure Resource Manager authentication mode by using an [ARM template](./quickstart-resource-manager.md), [Bicep](./quickstart-bicep.md), or the REST API. For REST API examples, see the [azure-rest-api-specs](https://github.com/Azure/azure-rest-api-specs/blob/main/specification/appconfiguration/resource-manager/Microsoft.AppConfiguration/AppConfiguration/preview/2025-02-01-preview/examples/ConfigurationStoresCreateWithDataPlaneProxy.json) GitHub repo.
5151
5252
### Azure Resource Manager authentication mode
5353

articles/backup/azure-data-lake-storage-backup-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ You can restore data from any point in time where a recovery point exists. Recov
6363
Azure Backup allows restoring data from any recovery point within the retention period set by the backup policy. Recovery points are created when the storage account is in protected state, and can be used to restore until they expire as per the retention policy. This solution allows performing granular recovery by selecting containers, applying a prefix-based filter, or restoring the full storage account.
6464

6565
>[!Note]
66-
>- To restore a recovery point to a different subscription, request the Azure Backup team to allowlist the required subscription and grant access by using the [signup form](https://forms.office.com/r/sixidTkYb4).
6766
>- Currently, the vaulted backup solution supports restoring data only to a different storage account within the same region as the vault. However, restoring data from older recovery points might result in a longer recovery time (higher [Recovery Time Objective](azure-backup-glossary.md#recovery-time-objective-rto)).
6867

6968
## Next steps

0 commit comments

Comments
 (0)