Chapters
Introduction
Introduction
0:00
Introduction
0:00
Why we care
Why we care
0:13
Why we care
0:13
Virtual Networks and NSGs
Virtual Networks and NSGs
0:27
Encryption
Encryption
3:08
Encryption
3:08
VNet Flow Logs
VNet Flow Logs
5:54
VNet Flow Logs
5:54
Security Admin Rules with AVNM
Security Admin Rules with AVNM
9:18
Benefits of VNet Flow Logs
Benefits of VNet Flow Logs
12:12
New scenarios supported
New scenarios supported
13:06
New scenarios supported
13:06
Which rule is logged
Which rule is logged
14:30
Which rule is logged
14:30
Storage of flow logs
Storage of flow logs
18:24
Storage of flow logs
18:24
Flow detail
Flow detail
21:29
Flow detail
21:29
Enabling VNet flow logs
Enabling VNet flow logs
22:57
Enabling VNet flow logs
22:57
Private endpoint consideration
Private endpoint consideration
23:41
Traffic analytics
Traffic analytics
24:04
Traffic analytics
24:04
Pricing
Pricing
25:00
Pricing
25:00
Summary
Summary
25:26
Summary
25:26
Sync to video time
Products
Products
Products
Description
306Likes
20,017Views
2024Feb 19
How this content was made
Auto-dubbed
Audio tracks for some languages were automatically generated. Learn more
Transcript
Follow along using the transcript.
Show transcript
John Savill's Technical Training
317K subscribers
Transcript
NaN / NaN