Now that you have successfully completed this lab, to avoid charges please follow the documentation steps to remove resources deployed during this workshop.
Choose the clean up instruction that match your Network Security deployment method.