Skip to content

Commit 6ee78c0

Browse files
Merge pull request #311862 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-16 23:00 UTC
2 parents 19ad23c + 944887d commit 6ee78c0

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

articles/partner-solutions/elastic/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Microsoft and [Elastic](https://www.elastic.co/) developed these services and ma
2424

2525
You can provision the Elastic resources through a resource provider named **Microsoft.Elastic**. Elastic owns and runs the SaaS application including the Elastic accounts created. Data is stored in the Azure region where the service is deployed.
2626

27-
You can find Elastic offerings in the [Azure portal](https://portal.azure.com/) or get it on [Azure Marketplace](https://azuremarketplace.microsoft.com/).
27+
You can find Elastic offerings in the [Azure portal](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.Elastic%2Fmonitors) or get it on [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/elastic.ec-azure-pp?tab=Overview).
2828

2929
## Key features
3030

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ DRS 2.2 includes 18 rule groups, as shown in the following table. Each group con
5252

5353

5454
#### Disabled rules
55-
DRS 2.2 rules configured in Paranoia Level 2 are disabled by default. You can leave their state as disabled if you wish to keep you WAF policy configured in Paranoia Level 1. If you wish to increase the policy's paranoia level, you can safely change these rules' state to enabled and their action to log mode. Analyze the logs, make the required fine tuning and enable the rules accordingly. For more information, see [#paranoia-level](Paranoia level) and [#tuning-of-managed-rule-sets](Tuning of managed rule sets)
55+
DRS 2.2 rules configured in Paranoia Level 2 are disabled by default. You can leave their state as disabled if you wish to keep you WAF policy configured in Paranoia Level 1. If you wish to increase the policy's paranoia level, you can safely change these rules' state to enabled and their action to log mode. Analyze the logs, make the required fine tuning and enable the rules accordingly. For more information, see [Paranoia level](?tabs=drs22%2Cowasp32#paranoia-level) and [Tuning of managed rule sets](?tabs=drs22%2Cowasp32#tuning-of-managed-rule-sets).
5656

5757
Some OWASP rules are superseded by Microsoft-authored replacements. The original rules are disabled by default and their descriptions end with “(replaced by …)”.
5858

0 commit comments

Comments
 (0)