Skip to content

Commit 84df6eb

Browse files
committed
Replace INCLUDE directives with markdown links in zero-trust-network-security.md
1 parent ce42f2d commit 84df6eb

1 file changed

Lines changed: 24 additions & 24 deletions

File tree

articles/networking/security/zero-trust-network-security.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ For more information, see [Zero Trust recommendations for Azure DDoS Protection]
3030

3131
| Recommendation | Risk level | User impact | Implementation cost |
3232
|---|---|---|---|
33-
| [!INCLUDE [DDoS Protection is enabled for all public IP addresses in VNets](includes/25533.md)] | High | Low | Low |
34-
| [!INCLUDE [Metrics are enabled for DDoS-protected public IPs](includes/26885.md)] | Medium | Low | Low |
35-
| [!INCLUDE [Diagnostic logging is enabled for DDoS-protected public IPs](includes/26886.md)] | Medium | Low | Low |
33+
| [DDoS Protection is enabled for all public IP addresses in VNets](includes/25533.md) | High | Low | Low |
34+
| [Metrics are enabled for DDoS-protected public IPs](includes/26885.md) | Medium | Low | Low |
35+
| [Diagnostic logging is enabled for DDoS-protected public IPs](includes/26886.md) | Medium | Low | Low |
3636

3737
## Azure Firewall
3838

@@ -42,11 +42,11 @@ For more information, see [Zero Trust recommendations for Azure Firewall](zero-t
4242

4343
| Recommendation | Risk level | User impact | Implementation cost |
4444
|---|---|---|---|
45-
| [!INCLUDE [Outbound traffic from VNet-integrated workloads is routed through Azure Firewall](includes/25535.md)] | High | Low | Medium |
46-
| [!INCLUDE [Threat intelligence is enabled in deny mode on Azure Firewall](includes/25537.md)] | High | Low | Low |
47-
| [!INCLUDE [IDPS inspection is enabled in deny mode on Azure Firewall](includes/25539.md)] | High | Low | Low |
48-
| [!INCLUDE [Inspection of outbound TLS traffic is enabled on Azure Firewall](includes/25550.md)] | High | Low | Low |
49-
| [!INCLUDE [Diagnostic logging is enabled in Azure Firewall](includes/26887.md)] | High | Low | Low |
45+
| [Outbound traffic from VNet-integrated workloads is routed through Azure Firewall](includes/25535.md) | High | Low | Medium |
46+
| [Threat intelligence is enabled in deny mode on Azure Firewall](includes/25537.md) | High | Low | Low |
47+
| [IDPS inspection is enabled in deny mode on Azure Firewall](includes/25539.md) | High | Low | Low |
48+
| [Inspection of outbound TLS traffic is enabled on Azure Firewall](includes/25550.md) | High | Low | Low |
49+
| [Diagnostic logging is enabled in Azure Firewall](includes/26887.md) | High | Low | Low |
5050

5151
## Application Gateway WAF
5252

@@ -56,14 +56,14 @@ For more information, see [Zero Trust recommendations for Application Gateway WA
5656

5757
| Recommendation | Risk level | User impact | Implementation cost |
5858
|---|---|---|---|
59-
| [!INCLUDE [Application Gateway WAF is enabled in prevention mode](includes/25541.md)] | High | Low | Low |
60-
| [!INCLUDE [Request body inspection is enabled in Application Gateway WAF](includes/26879.md)] | High | Low | Low |
61-
| [!INCLUDE [Default rule set is enabled in Application Gateway WAF](includes/26881.md)] | High | Low | Low |
62-
| [!INCLUDE [Bot protection rule set is enabled and assigned in Application Gateway WAF](includes/26882.md)] | High | Low | Low |
63-
| [!INCLUDE [HTTP DDoS protection rule set is enabled in Application Gateway WAF](includes/27015.md)] | High | Low | Low |
64-
| [!INCLUDE [Rate limiting is enabled in Application Gateway WAF](includes/27016.md)] | High | Low | Medium |
65-
| [!INCLUDE [JavaScript challenge is enabled in Application Gateway WAF](includes/27017.md)] | Medium | Low | Low |
66-
| [!INCLUDE [Diagnostic logging is enabled in Application Gateway WAF](includes/26888.md)] | High | Low | Low |
59+
| [Application Gateway WAF is enabled in prevention mode](includes/25541.md) | High | Low | Low |
60+
| [Request body inspection is enabled in Application Gateway WAF](includes/26879.md) | High | Low | Low |
61+
| [Default rule set is enabled in Application Gateway WAF](includes/26881.md) | High | Low | Low |
62+
| [Bot protection rule set is enabled and assigned in Application Gateway WAF](includes/26882.md) | High | Low | Low |
63+
| [HTTP DDoS protection rule set is enabled in Application Gateway WAF](includes/27015.md) | High | Low | Low |
64+
| [Rate limiting is enabled in Application Gateway WAF](includes/27016.md) | High | Low | Medium |
65+
| [JavaScript challenge is enabled in Application Gateway WAF](includes/27017.md) | Medium | Low | Low |
66+
| [Diagnostic logging is enabled in Application Gateway WAF](includes/26888.md) | High | Low | Low |
6767

6868
## Azure Front Door WAF
6969

@@ -73,14 +73,14 @@ For more information, see [Zero Trust recommendations for Azure Front Door WAF](
7373

7474
| Recommendation | Risk level | User impact | Implementation cost |
7575
|---|---|---|---|
76-
| [!INCLUDE [Azure Front Door WAF is enabled in prevention mode](includes/25543.md)] | High | Low | Low |
77-
| [!INCLUDE [Request body inspection is enabled in Azure Front Door WAF](includes/26880.md)] | High | Low | Low |
78-
| [!INCLUDE [Default rule set is assigned in Azure Front Door WAF](includes/26883.md)] | High | Low | Low |
79-
| [!INCLUDE [Bot protection rule set is enabled and assigned in Azure Front Door WAF](includes/26884.md)] | High | Low | Low |
80-
| [!INCLUDE [Rate limiting is enabled in Azure Front Door WAF](includes/27018.md)] | High | Low | Medium |
81-
| [!INCLUDE [JavaScript challenge is enabled in Azure Front Door WAF](includes/27019.md)] | Medium | Low | Low |
82-
| [!INCLUDE [CAPTCHA challenge is enabled in Azure Front Door WAF](includes/27020.md)] | Medium | Low | Low |
83-
| [!INCLUDE [Diagnostic logging is enabled in Azure Front Door WAF](includes/26889.md)] | High | Low | Low |
76+
| [Azure Front Door WAF is enabled in prevention mode](includes/25543.md) | High | Low | Low |
77+
| [Request body inspection is enabled in Azure Front Door WAF](includes/26880.md) | High | Low | Low |
78+
| [Default rule set is assigned in Azure Front Door WAF](includes/26883.md) | High | Low | Low |
79+
| [Bot protection rule set is enabled and assigned in Azure Front Door WAF](includes/26884.md) | High | Low | Low |
80+
| [Rate limiting is enabled in Azure Front Door WAF](includes/27018.md) | High | Low | Medium |
81+
| [JavaScript challenge is enabled in Azure Front Door WAF](includes/27019.md) | Medium | Low | Low |
82+
| [CAPTCHA challenge is enabled in Azure Front Door WAF](includes/27020.md) | Medium | Low | Low |
83+
| [Diagnostic logging is enabled in Azure Front Door WAF](includes/26889.md) | High | Low | Low |
8484

8585
## Related content
8686

0 commit comments

Comments
 (0)