Skip to content

Commit 6e571b9

Browse files
alt-text fixed
1 parent 5b1b2b3 commit 6e571b9

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

microsoft-365/enterprise/network-intermediation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The provisions of this article are focused on Microsoft 365 cloud applications a
4242

4343
### __Why You Should Not decrypt or manipulate Microsoft 365 Traffic at the network layer__
4444

45-
#### ![Network decryption being performed for Microsoft 365 traffic by a network intermediation device, this isn't a supported scenario.](media/network-intermediation/tls-intermediation.png)
45+
#### ![Diagram showing network decryption being performed for Microsoft 365 traffic by a network intermediation device. This isn't a supported scenario.](media/network-intermediation/tls-intermediation.png)
4646

4747
Manipulating Microsoft 365 traffic typically means using a proxy or firewall to decrypt SSL/TLS, scan the data to perform some inspection tasks, then re-encrypt it. Microsoft strongly advises against this for its cloud services. Here’s why:
4848

0 commit comments

Comments
 (0)