Skip to content

Commit 646c67e

Browse files
committed
fix1
1 parent aff8395 commit 646c67e

2 files changed

Lines changed: 4 additions & 4 deletions

File tree

articles/sentinel/enable-storage-network-security-how-to.md renamed to articles/sentinel/enable-storage-network-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To enable network security on the storage resources integrated with your Azure S
4242
- **Profile name**: Enter a profile name or accept the default.
4343
1. Select **Review + create** and then **Create**.
4444

45-
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimiter.png" lightbox="./media/enable-storage-network-security/ alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
45+
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimiter.png" lightbox="./media/enable-storage-network-security/create-network-security-perimiter.png" alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
4646

4747
### Associate the Storage Account with the Network Security Perimeter
4848
1. Open your newly created Network Security Perimeter resource.
@@ -109,7 +109,7 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
109109
1. Select **Profiles** and then select the profile associated with your storage account
110110
1. Select **Inbound access rules** and then select **Add**
111111

112-
:::image type="content" source="./media/enable-storage-network-security/inbound-access-rules.png" lightbox="./media/enable-storage-network-security/inbound-access-rules.png" alt-text="A screenshot showing the creation of an inbound access rule to allow a subscription in the Azure portal.":::
112+
:::image type="content" source="./media/enable-storage-network-security/inbound-access-rules.png" lightbox="./media/enable-storage-network-security/inbound-access-rules.png" alt-text="A screenshot showing the Inbound access rules page in the Azure portal.":::
113113

114114
1. Enter a **Rule name**, for example `Allow-Subscription`
115115
1. Select *Subscription* from the **Source type** drop-down
@@ -138,7 +138,7 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
138138
> [!IMPORTANT]
139139
> Remove the quotes from the IP ranges and ensure that there's no trailing comma on the last entry before pasting them into the **Allowed Sources** field.
140140
141-
:::image type="content" source="./media/enable-storage-network-security/scuba-ipv4-addresses.png" lightbox="./media/enable-storage-network-security/scuba-ipv4-addresses.png" alt-text="A screenshot showing the creation of an inbound access rule to allow a subscription in the Azure portal.":::
141+
:::image type="content" source="./media/enable-storage-network-security/scuba-ipv4-addresses.png" lightbox="./media/enable-storage-network-security/scuba-ipv4-addresses.png" alt-text="A screenshot showing a part of the ServiceTags_Public.json file with the Scuba service tag and IPv4 ranges highlighted.":::
142142

143143

144144
### Validate and enforce
@@ -175,7 +175,7 @@ Setting the storage account to **Secured by Perimeter** ensures that all traffic
175175
3. Set **Secured by Perimeter (Most restricted)**
176176
4. Select **Save**
177177

178-
:::image type="content" source="./media/enable-storage-network-security/set-storage-networing.png" lightbox="./media/enable-storage-network-security/set-storage-networking.png" alt-text="A screenshot showing how to set a storage account to 'Secured by Perimeter' in the Azure portal.":::
178+
:::image type="content" source="./media/enable-storage-network-security/set-storage-networking.png" lightbox="./media/enable-storage-network-security/set-storage-networking.png" alt-text="A screenshot showing how to set a storage account to 'Secured by Perimeter' in the Azure portal.":::
179179

180180

181181
## Next steps

articles/sentinel/media/enable-storage-network-security/set-storage-networing.png renamed to articles/sentinel/media/enable-storage-network-security/set-storage-networking.png

File renamed without changes.

0 commit comments

Comments
 (0)