Skip to main content

Documentation Index

Fetch the complete documentation index at: https://help.dsalta.com/llms.txt

Use this file to discover all available pages before exploring further.

Checks that the default network access rule for Azure storage accounts is set to deny.

Why This Matters

This configuration gap may expose your environment to security risks, compliance violations, or operational issues. Addressing it promptly ensures your systems meet industry best practices and compliance framework requirements.

What DSALTA Checks

DSALTA connects to your Microsoft Azure environment using read-only API access and evaluates this configuration on every sync cycle. The test result appears in your Data Library → Tests dashboard:
  • Passing — The configuration meets requirements. No action needed.
  • Failing — The configuration does not meet requirements. Follow the remediation steps below.
  • Not configured — The integration is connected but the required service or feature has not been set up yet.
This test runs automatically every 24 hours. If you fix the underlying issue, DSALTA will detect the change on the next sync cycle and update the status to Passing. You can also trigger a manual sync from Settings → Integrations → Microsoft Azure.

How to Fix

If this test is failing, follow these steps to remediate:
  1. Sign in to the Azure Portal and navigate to Storage accounts → your account.
  2. Go to Networking.
  3. Under Public network access, select Enabled from selected virtual networks and IP addresses.
  4. The default action will be set to Deny for traffic not matching allowed networks.
  5. Add your VNets and IP ranges under the allowed list.
  6. Click Save.
  7. Once configured, DSALTA will detect the change on the next sync and update the test status to Passing.

Frequently Asked Questions

This test runs automatically every 24 hours when the Microsoft Azure integration is connected. You can trigger a manual sync at any time from the integration settings page.
A failing test generates an alert in your DSALTA dashboard. The assigned responsible role receives a notification. Remediate the issue before it affects your compliance posture.
Yes. If this test does not apply to your environment, you can mark it as Not Applicable with a justification. This exclusion is documented for auditors.
No. DSALTA uses read-only API access and never modifies, creates, or deletes resources in your environment. Remediation actions must be performed by your team directly in Microsoft Azure.