You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Replace INCLUDE table format with header+include format and fix links
- Convert 4 service recommendation pages from table format to header+include
format matching the Entra docs pattern (each recommendation gets a ### heading
followed by the [!INCLUDE] directive)
- Update summary page links to point to specific heading anchors on each
service page instead of out-of-scope include files
- Add Zero Trust recommendations card to index.yml highlighted content
|[DDoS Protection is enabled for all public IP addresses in VNets](includes/25533.md)| High | Low | Low |
34
-
|[Metrics are enabled for DDoS-protected public IPs](includes/26885.md)| Medium | Low | Low |
35
-
|[Diagnostic logging is enabled for DDoS-protected public IPs](includes/26886.md)| Medium | Low | Low |
33
+
|[DDoS Protection is enabled for all public IP addresses in VNets](zero-trust-ddos-protection.md#ddos-protection-is-enabled-for-all-public-ip-addresses-in-vnets)| High | Low | Low |
34
+
|[Metrics are enabled for DDoS-protected public IPs](zero-trust-ddos-protection.md#metrics-are-enabled-for-ddos-protected-public-ips)| Medium | Low | Low |
35
+
|[Diagnostic logging is enabled for DDoS-protected public IPs](zero-trust-ddos-protection.md#diagnostic-logging-is-enabled-for-ddos-protected-public-ips)| Medium | Low | Low |
36
36
37
37
## Azure Firewall
38
38
@@ -42,11 +42,11 @@ For more information, see [Zero Trust recommendations for Azure Firewall](zero-t
|[Outbound traffic from VNet-integrated workloads is routed through Azure Firewall](includes/25535.md)| High | Low | Medium |
46
-
|[Threat intelligence is enabled in deny mode on Azure Firewall](includes/25537.md)| High | Low | Low |
47
-
|[IDPS inspection is enabled in deny mode on Azure Firewall](includes/25539.md)| High | Low | Low |
48
-
|[Inspection of outbound TLS traffic is enabled on Azure Firewall](includes/25550.md)| High | Low | Low |
49
-
|[Diagnostic logging is enabled in Azure Firewall](includes/26887.md)| High | Low | Low |
45
+
|[Outbound traffic from VNet-integrated workloads is routed through Azure Firewall](zero-trust-azure-firewall.md#outbound-traffic-from-vnet-integrated-workloads-is-routed-through-azure-firewall)| High | Low | Medium |
46
+
|[Threat intelligence is enabled in deny mode on Azure Firewall](zero-trust-azure-firewall.md#threat-intelligence-is-enabled-in-deny-mode-on-azure-firewall)| High | Low | Low |
47
+
|[IDPS inspection is enabled in deny mode on Azure Firewall](zero-trust-azure-firewall.md#idps-inspection-is-enabled-in-deny-mode-on-azure-firewall)| High | Low | Low |
48
+
|[Inspection of outbound TLS traffic is enabled on Azure Firewall](zero-trust-azure-firewall.md#inspection-of-outbound-tls-traffic-is-enabled-on-azure-firewall)| High | Low | Low |
49
+
|[Diagnostic logging is enabled in Azure Firewall](zero-trust-azure-firewall.md#diagnostic-logging-is-enabled-in-azure-firewall)| High | Low | Low |
50
50
51
51
## Application Gateway WAF
52
52
@@ -56,14 +56,14 @@ For more information, see [Zero Trust recommendations for Application Gateway WA
|[Application Gateway WAF is enabled in prevention mode](includes/25541.md)| High | Low | Low |
60
-
|[Request body inspection is enabled in Application Gateway WAF](includes/26879.md)| High | Low | Low |
61
-
|[Default rule set is enabled in Application Gateway WAF](includes/26881.md)| High | Low | Low |
62
-
|[Bot protection rule set is enabled and assigned in Application Gateway WAF](includes/26882.md)| High | Low | Low |
63
-
|[HTTP DDoS protection rule set is enabled in Application Gateway WAF](includes/27015.md)| High | Low | Low |
64
-
|[Rate limiting is enabled in Application Gateway WAF](includes/27016.md)| High | Low | Medium |
65
-
|[JavaScript challenge is enabled in Application Gateway WAF](includes/27017.md)| Medium | Low | Low |
66
-
|[Diagnostic logging is enabled in Application Gateway WAF](includes/26888.md)| High | Low | Low |
59
+
|[Application Gateway WAF is enabled in prevention mode](zero-trust-application-gateway-waf.md#application-gateway-waf-is-enabled-in-prevention-mode)| High | Low | Low |
60
+
|[Request body inspection is enabled in Application Gateway WAF](zero-trust-application-gateway-waf.md#request-body-inspection-is-enabled-in-application-gateway-waf)| High | Low | Low |
61
+
|[Default rule set is enabled in Application Gateway WAF](zero-trust-application-gateway-waf.md#default-rule-set-is-enabled-in-application-gateway-waf)| High | Low | Low |
62
+
|[Bot protection rule set is enabled and assigned in Application Gateway WAF](zero-trust-application-gateway-waf.md#bot-protection-rule-set-is-enabled-and-assigned-in-application-gateway-waf)| High | Low | Low |
63
+
|[HTTP DDoS protection rule set is enabled in Application Gateway WAF](zero-trust-application-gateway-waf.md#http-ddos-protection-rule-set-is-enabled-in-application-gateway-waf)| High | Low | Low |
64
+
|[Rate limiting is enabled in Application Gateway WAF](zero-trust-application-gateway-waf.md#rate-limiting-is-enabled-in-application-gateway-waf)| High | Low | Medium |
65
+
|[JavaScript challenge is enabled in Application Gateway WAF](zero-trust-application-gateway-waf.md#javascript-challenge-is-enabled-in-application-gateway-waf)| Medium | Low | Low |
66
+
|[Diagnostic logging is enabled in Application Gateway WAF](zero-trust-application-gateway-waf.md#diagnostic-logging-is-enabled-in-application-gateway-waf)| High | Low | Low |
67
67
68
68
## Azure Front Door WAF
69
69
@@ -73,14 +73,14 @@ For more information, see [Zero Trust recommendations for Azure Front Door WAF](
|[Azure Front Door WAF is enabled in prevention mode](includes/25543.md)| High | Low | Low |
77
-
|[Request body inspection is enabled in Azure Front Door WAF](includes/26880.md)| High | Low | Low |
78
-
|[Default rule set is assigned in Azure Front Door WAF](includes/26883.md)| High | Low | Low |
79
-
|[Bot protection rule set is enabled and assigned in Azure Front Door WAF](includes/26884.md)| High | Low | Low |
80
-
|[Rate limiting is enabled in Azure Front Door WAF](includes/27018.md)| High | Low | Medium |
81
-
|[JavaScript challenge is enabled in Azure Front Door WAF](includes/27019.md)| Medium | Low | Low |
82
-
|[CAPTCHA challenge is enabled in Azure Front Door WAF](includes/27020.md)| Medium | Low | Low |
83
-
|[Diagnostic logging is enabled in Azure Front Door WAF](includes/26889.md)| High | Low | Low |
76
+
|[Azure Front Door WAF is enabled in prevention mode](zero-trust-front-door-waf.md#azure-front-door-waf-is-enabled-in-prevention-mode)| High | Low | Low |
77
+
|[Request body inspection is enabled in Azure Front Door WAF](zero-trust-front-door-waf.md#request-body-inspection-is-enabled-in-azure-front-door-waf)| High | Low | Low |
78
+
|[Default rule set is assigned in Azure Front Door WAF](zero-trust-front-door-waf.md#default-rule-set-is-assigned-in-azure-front-door-waf)| High | Low | Low |
79
+
|[Bot protection rule set is enabled and assigned in Azure Front Door WAF](zero-trust-front-door-waf.md#bot-protection-rule-set-is-enabled-and-assigned-in-azure-front-door-waf)| High | Low | Low |
80
+
|[Rate limiting is enabled in Azure Front Door WAF](zero-trust-front-door-waf.md#rate-limiting-is-enabled-in-azure-front-door-waf)| High | Low | Medium |
81
+
|[JavaScript challenge is enabled in Azure Front Door WAF](zero-trust-front-door-waf.md#javascript-challenge-is-enabled-in-azure-front-door-waf)| Medium | Low | Low |
82
+
|[CAPTCHA challenge is enabled in Azure Front Door WAF](zero-trust-front-door-waf.md#captcha-challenge-is-enabled-in-azure-front-door-waf)| Medium | Low | Low |
83
+
|[Diagnostic logging is enabled in Azure Front Door WAF](zero-trust-front-door-waf.md#diagnostic-logging-is-enabled-in-azure-front-door-waf)| High | Low | Low |
0 commit comments