Skip to content

Commit d1c5a9c

Browse files
committed
fix
1 parent 6d65060 commit d1c5a9c

3 files changed

Lines changed: 7 additions & 8 deletions

File tree

articles/sentinel/data-connection-rules-reference-azure-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,4 +203,4 @@ For more information, see [Create data connector REST API example](/rest/api/sec
203203

204204
- [Set up your Azure Storage connector to stream logs to Microsoft Sentinel](setup-azure-storage-connector.md)
205205
- [Create a codeless connector for Microsoft Sentinel](create-codeless-connector.md)
206-
- [Enable network security on connector integrated storage resources](enable-storage-network-security-how-to.md)
206+
- [Enable network security on connector integrated storage resources](enable-storage-network-security.md)

articles/sentinel/enable-storage-network-security.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -36,14 +36,13 @@ To enable network security on the storage resources integrated with your Azure S
3636
1. In the Azure portal, search for *Network Security Perimeters*
3737

3838
1. Select **Create**.
39-
1. Configure the following fields:
40-
- **Subscription** and **Resource group**.
41-
- **Name**, for example `storageblob-connectors-nsp`
42-
- **Region**. The region must be the same region as the storage account.
43-
- **Profile name**: Enter a profile name or accept the default.
39+
1. Select a **Subscription** and **Resource group**.
40+
1. Enter **Name**, for example `storageblob-connectors-nsp`
41+
1. Select a **Region**. The region must be the same region as the storage account.
42+
1. Enter a **Profile name** or accept the default. The profile defines the set of rules that are applied to associated resources. You can have multiple profiles within a single NSP to apply different rules to different resources if required.
4443
1. Select **Review + create** and then **Create**.
4544

46-
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimiter.png" lightbox="./media/enable-storage-network-security/create-network-security-perimiter.png" alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
45+
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimeter.png" lightbox="./media/enable-storage-network-security/create-network-security-perimeter.png" alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
4746

4847
### Associate the Storage Account with the Network Security Perimeter
4948
1. Open your newly created Network Security Perimeter resource
@@ -54,7 +53,7 @@ To enable network security on the storage resources integrated with your Azure S
5453
1. Search for and add your storage account, then select **Select**.
5554
1. Select **Associate**.
5655

57-
Access mode is set to **Transition** by default, allowing you to validate the configuration before enforcing restrictions.
56+
The access mode is set to **Transition** by default, allowing you to validate the configuration before enforcing restrictions.
5857

5958
:::image type="content" source="./media/enable-storage-network-security/associate-resources.png" lightbox="./media/enable-storage-network-security/associate-resources.png" alt-text="A screenshot showing how to associate a storage account with the Network Security Perimeter in the Azure portal.":::
6059

articles/sentinel/media/enable-storage-network-security/create-network-security-perimiter.png renamed to articles/sentinel/media/enable-storage-network-security/create-network-security-perimeter.png

File renamed without changes.

0 commit comments

Comments
 (0)