You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/enable-storage-network-security.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ To enable network security on the storage resources integrated with your Azure S
42
42
-**Profile name**: Enter a profile name or accept the default.
43
43
1. Select **Review + create** and then **Create**.
44
44
45
-
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimiter.png" lightbox="./media/enable-storage-network-security/ alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
45
+
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimiter.png" lightbox="./media/enable-storage-network-security/create-network-security-perimiter.png" alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
46
46
47
47
### Associate the Storage Account with the Network Security Perimeter
48
48
1. Open your newly created Network Security Perimeter resource.
@@ -109,7 +109,7 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
109
109
1. Select **Profiles** and then select the profile associated with your storage account
110
110
1. Select **Inbound access rules** and then select **Add**
111
111
112
-
:::image type="content" source="./media/enable-storage-network-security/inbound-access-rules.png" lightbox="./media/enable-storage-network-security/inbound-access-rules.png" alt-text="A screenshot showing the creation of an inbound access rule to allow a subscription in the Azure portal.":::
112
+
:::image type="content" source="./media/enable-storage-network-security/inbound-access-rules.png" lightbox="./media/enable-storage-network-security/inbound-access-rules.png" alt-text="A screenshot showing the Inbound access rules page in the Azure portal.":::
113
113
114
114
1. Enter a **Rule name**, for example `Allow-Subscription`
115
115
1. Select *Subscription* from the **Source type** drop-down
@@ -138,7 +138,7 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
138
138
> [!IMPORTANT]
139
139
> Remove the quotes from the IP ranges and ensure that there's no trailing comma on the last entry before pasting them into the **Allowed Sources** field.
140
140
141
-
:::image type="content" source="./media/enable-storage-network-security/scuba-ipv4-addresses.png" lightbox="./media/enable-storage-network-security/scuba-ipv4-addresses.png" alt-text="A screenshot showing the creation of an inbound access rule to allow a subscription in the Azure portal.":::
141
+
:::image type="content" source="./media/enable-storage-network-security/scuba-ipv4-addresses.png" lightbox="./media/enable-storage-network-security/scuba-ipv4-addresses.png" alt-text="A screenshot showing a part of the ServiceTags_Public.json file with the Scuba service tag and IPv4 ranges highlighted.":::
142
142
143
143
144
144
### Validate and enforce
@@ -175,7 +175,7 @@ Setting the storage account to **Secured by Perimeter** ensures that all traffic
175
175
3. Set **Secured by Perimeter (Most restricted)**
176
176
4. Select **Save**
177
177
178
-
:::image type="content" source="./media/enable-storage-network-security/set-storage-networing.png" lightbox="./media/enable-storage-network-security/set-storage-networking.png" alt-text="A screenshot showing how to set a storage account to 'Secured by Perimeter' in the Azure portal.":::
178
+
:::image type="content" source="./media/enable-storage-network-security/set-storage-networking.png" lightbox="./media/enable-storage-network-security/set-storage-networking.png" alt-text="A screenshot showing how to set a storage account to 'Secured by Perimeter' in the Azure portal.":::
0 commit comments