diff --git a/en/azure/networksecuritygroups/open-mysql.md b/en/azure/networksecuritygroups/open-mysql.md
index 55a626a6d..0af806423 100644
--- a/en/azure/networksecuritygroups/open-mysql.md
+++ b/en/azure/networksecuritygroups/open-mysql.md
@@ -15,16 +15,14 @@
| **Recommended Action** | Restrict TCP ports 4333 and 3306 to known IP addresses |
## Detailed Remediation Steps
-
-
-1. Log into the Microsoft Azure Management Console.
-2. Select the "Search resources, services, and docs" option at the top and search for Network security groups.
+1. Log in to the Microsoft Azure Management Console.
+2. Click on the search bar at the top and search for Network security groups.
3. Select the "Network security group" that needs to be verified.
4. Click on the "Name" of the selected "Network security group" to access the port configurations.
5. In the "Overview" tab scroll down the page and check the "Inbound security rules" under the "Settings".
-6. If the "MySQL" for port 4333 or 3306 with the protocol "TCP" is showing as "Allow" for all "Source" and "Destination" then the selected "Network security group" has TCP port 4333 or 3306 for MySQL is open to the public.
-7. Repeat steps number 2 - 6 to verify other "Network security group."
-8. Navigate to the "Network security group" and select the security group that needs to modify for restricting the "TCP" port for "MySQL" on port 4333 or 3306 to specific IP Address.
-9. Scroll down the left navigation panel and choose "Inbound security rules" under "Settings."
-10. Click on the "MySQL" protocol in the "Name" column and under "Source" select the "IP Address" from the dropdown menu and enter the "Source IP addresses/CIDR ranges" as per the requirement, select the required Protocol and Action and click on the "Save" option at the top panel.
+6. If the "MySQL" for port 4333 or 3306 with the protocol "TCP" is showing as "Allow" under "Actions" column for all "Source" and "Destination" then the selected "Network security group" has TCP port 4333 or 3306 for MySQL open to the public.
+7. Repeat steps number 2 - 6 to verify other "Network security groups".
+8. Navigate to the "Network security group" and select the security group that needs to be modified for restricting the "TCP" port for "MySQL" on port 4333 or 3306 to specific IP Address.
+9. Scroll down the left navigation panel and choose "Inbound security rules" under "Settings".
+10. Click on the "MySQL" protocol in the "Name" column and in the right pane under "Source" select the "IP Address" from the dropdown menu and enter the "Source IP addresses/CIDR ranges" as per the requirement, select the required Protocol and Action and click on the "Save" option at the top of the pane.
11. Repeat steps number 8 - 10 to restrict TCP port 4333 or 3306 for MySQL to known IP addresses.
diff --git a/resources/azure/networksecuritygroups/open-mysql/.DS_Store b/resources/azure/networksecuritygroups/open-mysql/.DS_Store
new file mode 100644
index 000000000..ffa2c717f
Binary files /dev/null and b/resources/azure/networksecuritygroups/open-mysql/.DS_Store differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step10.png b/resources/azure/networksecuritygroups/open-mysql/step10.png
index 5fdeb234a..d0b16c733 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step10.png and b/resources/azure/networksecuritygroups/open-mysql/step10.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step2.png b/resources/azure/networksecuritygroups/open-mysql/step2.png
index 05f7c3ab2..0582b1718 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step2.png and b/resources/azure/networksecuritygroups/open-mysql/step2.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step3.png b/resources/azure/networksecuritygroups/open-mysql/step3.png
index 6faba374f..7624fee78 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step3.png and b/resources/azure/networksecuritygroups/open-mysql/step3.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step4.png b/resources/azure/networksecuritygroups/open-mysql/step4.png
index 7ebb83443..050bbda78 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step4.png and b/resources/azure/networksecuritygroups/open-mysql/step4.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step5.png b/resources/azure/networksecuritygroups/open-mysql/step5.png
index 038f28950..5664d8d61 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step5.png and b/resources/azure/networksecuritygroups/open-mysql/step5.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step6.png b/resources/azure/networksecuritygroups/open-mysql/step6.png
index e463d8c1e..d06b216e2 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step6.png and b/resources/azure/networksecuritygroups/open-mysql/step6.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step8.png b/resources/azure/networksecuritygroups/open-mysql/step8.png
index f252fef7e..7624fee78 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step8.png and b/resources/azure/networksecuritygroups/open-mysql/step8.png differ
diff --git a/resources/azure/networksecuritygroups/open-mysql/step9.png b/resources/azure/networksecuritygroups/open-mysql/step9.png
index dcd83bd62..3dceec398 100644
Binary files a/resources/azure/networksecuritygroups/open-mysql/step9.png and b/resources/azure/networksecuritygroups/open-mysql/step9.png differ