text stringlengths 0 3.99k | embedding listlengths 768 768 | metadata dict |
|---|---|---|
Now, test to ensure you can connect to the storage account container using SFTP. You
can use any SFTP client to test the connection. In this example, we use sftp from a
command prompt.
For example, for a storage account named teststorageaccount , a container named
testcontainer , a local account named testuser , and a ... | [
-0.003923165146261454,
-0.025580402463674545,
-0.01756240986287594,
0.060572899878025055,
0.06955237686634064,
0.021437345072627068,
0.016174819320440292,
0.022054169327020645,
-0.0061147878877818584,
-0.06410792469978333,
0.026030631735920906,
-0.03565995395183563,
-0.02148907259106636,
-... | {
"azure_component": "security",
"chunk_index": 459,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "435",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You should now be connected to the storage account container using SFTP. You can use
put and get commands to upload and download files. Use ls to list the files in the
container, and lls to list the files in the local directory.
When no longer needed, you can use the following command to remove the resource
group, ... | [
-0.0052549890242516994,
0.003223702311515808,
0.0318787582218647,
0.044423140585422516,
0.10411136597394943,
0.019298311322927475,
-0.004032684490084648,
0.006892425008118153,
0.012742382474243641,
-0.04079066216945648,
-0.04759018123149872,
0.0004773869295604527,
-0.07534672319889069,
-0.... | {
"azure_component": "security",
"chunk_index": 460,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "436",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Add or modify multiple Azure Firewall
rules using Azure PowerShell
Article • 03/08/2023
When you add new rules to Azure Firewall or Azure Firewall policy, you should use the
following steps to reduce the total update time:
1. Retrieve the Azure Firewall or Azure Firewall Policy object.
2. Add all new rules and perform ... | [
0.015054194256663322,
-0.017631132155656815,
0.01059867162257433,
0.017505548894405365,
0.07283840328454971,
-0.00909856054931879,
0.05545065924525261,
-0.01723041757941246,
0.011597482487559319,
-0.06662728637456894,
-0.03580523654818535,
0.02616821974515915,
-0.0828917846083641,
-0.01570... | {
"azure_component": "security",
"chunk_index": 461,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "437",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure PowerShell
Azure PowerShell
Use this step to add any more rules, or perform any modifications to existing rules in the
same rule collection group.
Azure PowerShell
Azure Firewall Policy rule sets
<Rule Collection Group Name>" -ResourceGroupName "<Resource Group Name>" -
AzureFirewallPolicyName "<Firewall Policy N... | [
0.0038474351167678833,
-0.03098776750266552,
0.018339861184358597,
0.006410230416804552,
0.05377351865172386,
-0.04554985091090202,
0.05129605531692505,
-0.014273891225457191,
-0.0023543313145637512,
-0.0666971206665039,
-0.038745105266571045,
0.014861524105072021,
-0.08161257952451706,
0.... | {
"azure_component": "security",
"chunk_index": 462,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "438",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
How to set up and monitor Azure Firewall
DNAT rules for secure traffic management
07/03/2025
Azure Firewall DNAT (Destination Network Address Translation) rules are used to filter and rout
inbound traffic. They allow you to translate the public-facing destination IP address and port of
incoming traffic to a private IP ... | [
0.0022203053813427687,
-0.009408817626535892,
0.02229217253625393,
-0.02447102591395378,
0.03825375810265541,
-0.009457860141992569,
0.027519425377249718,
-0.0025085145607590675,
0.048541512340307236,
-0.0589919313788414,
-0.023880554363131523,
-0.022420449182391167,
-0.07682415843009949,
... | {
"azure_component": "security",
"chunk_index": 463,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "439",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. Select DNAT rules.
4. Select + Add DNAT rule collection.
5. In the Add a rule collection pane, provide the following information:
Name: Enter a name for the DNAT rule collection.
Priority: Specify a priority for the rule collection. Lower numbers indicate higher
priority. The range is 100-65000.
Action: Destination ... | [
0.003519113641232252,
-0.017767421901226044,
-0.013883055187761784,
-0.0027905150782316923,
0.04834820702672005,
-0.04875684902071953,
0.007145760580897331,
0.004372666589915752,
0.03297577053308487,
-0.07505456358194351,
-0.006327460054308176,
0.01774773932993412,
-0.08529496937990189,
0.... | {
"azure_component": "security",
"chunk_index": 464,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "440",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Translated field: For DNAT rules using FQDN filtering, the logs display the resolved IP
address in the translated field instead of the FQDN.
Private DNS zones: Supported only within virtual networks (VNets). This feature isn't
available for virtual WAN SKUs.
Multiple IPs in DNS resolution: If an FQDN resolves to multip... | [
-0.0025577261112630367,
-0.007838482968509197,
0.0006932582473382354,
0.008519996888935566,
0.08400492370128632,
-0.007634238805621862,
0.030203327536582947,
-0.011471647769212723,
0.030828038230538368,
-0.04910140112042427,
-0.0035899553913623095,
0.008523470722138882,
-0.056067172437906265... | {
"azure_component": "security",
"chunk_index": 465,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "441",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall DNS Proxy details
Article • 06/11/2024
You can configure Azure Firewall to act as a DNS proxy. A DNS proxy is an intermediary
for DNS requests from client virtual machines to a DNS server.
The following information describes some implementation details for Azure Firewall
DNS Proxy.
Azure Firewall acts as... | [
-0.005229992792010307,
-0.004499792121350765,
-0.006797806825488806,
0.0031167150009423494,
0.05996519327163696,
0.009065096266567707,
0.03336944803595543,
0.003996876999735832,
-0.010951243340969086,
-0.04731397703289986,
-0.012790628708899021,
0.003346132580190897,
-0.061579398810863495,
... | {
"azure_component": "security",
"chunk_index": 466,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "442",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
In this example, if an FQDN is configured in Network rules, the firewall resolves the
FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and
when the client resolves the same FQDN to IP2 because of a difference in DNS response,
it... | [
-0.036408431828022,
-0.015047913417220116,
-0.028495851904153824,
0.01768706925213337,
0.0754726231098175,
-0.0008720294572412968,
0.015995919704437256,
0.013422755524516106,
-0.00981611292809248,
-0.05383267253637314,
-0.025129130110144615,
-0.03838355466723442,
-0.09629694372415543,
0.04... | {
"azure_component": "security",
"chunk_index": 467,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "443",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall DNS settings
05/19/2025
You can configure a custom DNS server and enable DNS proxy for Azure Firewall. Configure
these settings when you deploy the firewall, or configure them later from the DNS settings
page. By default, Azure Firewall uses Azure DNS and DNS Proxy is disabled.
A DNS server maintains and... | [
-0.015021132305264473,
0.022048713639378548,
0.0022431255783885717,
0.016387758776545525,
0.07329069823026657,
0.02858085185289383,
0.03062971867620945,
-0.0017113403882831335,
0.016059376299381256,
-0.0556345209479332,
-0.04008817300200462,
-0.012419894337654114,
-0.06386402249336243,
0.0... | {
"azure_component": "security",
"chunk_index": 468,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "444",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
If you enable FQDN filtering in network rules but don't configure client virtual machines to use
the Azure Firewall as their DNS proxy, DNS requests from these clients might be resolved at
different times or return different results than those seen by the Azure Firewall. To ensure
consistent DNS resolution and FQDN fil... | [
-0.03415660187602043,
-0.003282877616584301,
-0.007500296924263239,
0.01077303010970354,
0.08309096097946167,
0.014793596230447292,
0.03525013104081154,
-0.011021517217159271,
0.01380850002169609,
-0.05749516934156418,
-0.022077521309256554,
0.0009874874958768487,
-0.06500228494405746,
0.0... | {
"azure_component": "security",
"chunk_index": 469,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "445",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To configure DNS proxy, you must configure your virtual network DNS servers setting to
use the firewall private IP address. Then enable the DNS proxy in the Azure Firewall DNS
settings.
1. Select the virtual network where the DNS traffic is routed through the Azure Firewall
instance.
2. Under Settings, select DNS serve... | [
0.0033618686720728874,
0.012357822619378567,
-0.0069062113761901855,
0.022562887519598007,
0.0830000638961792,
0.022392751649022102,
0.04335398972034454,
-0.0024580275639891624,
0.031903959810733795,
-0.06461602449417114,
-0.03375442326068878,
0.006298440042883158,
-0.042704567313194275,
0... | {
"azure_component": "security",
"chunk_index": 470,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "446",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
DNS proxy performs five-second health check loops for as long as the upstream servers report
as unhealthy. The health checks are a recursive DNS query to the root name server. Once an
upstream server is considered healthy, the firewall stops health checks until the next error.
When a healthy proxy returns an error, the... | [
-0.013454756699502468,
-0.008875681087374687,
-0.010349202901124954,
0.025140641257166862,
0.08781509101390839,
-0.009528263472020626,
0.0540061816573143,
0.026136580854654312,
0.02604982629418373,
-0.0671398863196373,
-0.007539482321590185,
-0.01922767423093319,
-0.05163797363638878,
0.03... | {
"azure_component": "security",
"chunk_index": 471,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "447",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
servicebus.windows.net
blob.storage.azure.net
blob.core.windows.net
arm-msedge.net
cloudapp.azure.com
monitoring.core.windows.net
For example, Azure Firewall management traffic requires access to storage accounts using the
domain blob.core.windows.net . If you create a Private DNS zone for *.blob.core.windows.net
and a... | [
-0.028585584834218025,
-0.04379061982035637,
0.006984062027186155,
0.006970426999032497,
0.09724638611078262,
-0.004598064813762903,
-0.0006204232922755182,
0.007253566756844521,
-0.011071315966546535,
-0.049930378794670105,
-0.019555823877453804,
-0.05982871726155281,
-0.0481894388794899,
... | {
"azure_component": "security",
"chunk_index": 472,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "448",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
FQDN tags overview
Article • 06/07/2024
An FQDN tag represents a group of fully qualified domain names (FQDNs) associated
with well known Microsoft services. You can use an FQDN tag in application rules to
allow the required outbound network traffic through your firewall.
For example, to manually allow Windows Update n... | [
-0.009084467776119709,
-0.026709364727139473,
0.0414932444691658,
-0.008472389541566372,
0.057445019483566284,
-0.05760541185736656,
0.006195547990500927,
-0.015401683747768402,
-0.01608939841389656,
-0.03945794329047203,
-0.07439256459474564,
-0.018709948286414146,
-0.09854165464639664,
0... | {
"azure_component": "security",
"chunk_index": 473,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "449",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
FQDN tag
Description
AzureHDInsight
Allows outbound access for HDInsight platform traffic. This
tag doesn’t cover customer-specific Storage or SQL traffic
from HDInsight. Enable these using Service Endpoints or add
them manually.
WindowsVirtualDesktop
Allows outbound Azure Virtual Desktop (formerly Windows
Virtual Desk... | [
-0.03526236489415169,
-0.01552294660359621,
0.012660765089094639,
0.017648989334702492,
0.044623445719480515,
-0.04046226292848587,
0.034838225692510605,
-0.007053052075207233,
-0.010686716996133327,
-0.01946500688791275,
-0.06808428466320038,
-0.025867335498332977,
-0.06622812151908875,
0... | {
"azure_component": "security",
"chunk_index": 474,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "450",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall service tags
Article • 03/19/2025
A service tag represents a group of IP address prefixes to simplify security rule creation.
You cannot create your own service tag or specify which IP addresses are included.
Microsoft manages and updates the address prefixes within the service tag
automatically.
Azure F... | [
-0.003622722113505006,
-0.01580435410141945,
0.022945357486605644,
0.0029206275939941406,
0.03640861064195633,
-0.023014776408672333,
0.05878632888197899,
0.022343836724758148,
0.012958670035004616,
-0.03503333777189255,
-0.048360675573349,
-0.03178226202726364,
-0.05184338614344597,
0.011... | {
"azure_component": "security",
"chunk_index": 475,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "451",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Update the Azure Firewall definition with the new network rules:
PowerShell
Finally, commit the network rule changes to the running Azure Firewall instance:
PowerShell
To learn more about Azure Firewall rules, see Azure Firewall rule ... | [
-0.00819347519427538,
-0.01783159002661705,
-0.018249094486236572,
-0.0038737442810088396,
0.04977167770266533,
-0.03978084400296211,
0.04104626551270485,
0.014466477558016777,
0.006683978717774153,
-0.03560537472367287,
-0.03400328382849693,
-0.008211100473999977,
-0.06990741193294525,
0.... | {
"azure_component": "security",
"chunk_index": 476,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "452",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Scale SNAT ports with Azure NAT
Gateway
Article • 01/31/2025
Azure Firewall provides 2,496 SNAT ports per public IP address configured per backend
virtual machine scale set instance (Minimum of two instances), and you can associate up
to 250 public IP addresses. Depending on your architecture and traffic patterns, you
... | [
-0.008226667530834675,
-0.05093265324831009,
0.0011438491055741906,
-0.013694928027689457,
0.009874124079942703,
0.032365571707487106,
0.04874642938375473,
0.014576179906725883,
-0.03156905993819237,
-0.01729547046124935,
-0.011247843503952026,
-0.030493425205349922,
-0.04994247108697891,
... | {
"azure_component": "security",
"chunk_index": 477,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "453",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The following example creates and attaches a NAT gateway with an Azure Firewall
subnet using Azure PowerShell.
Azure PowerShell
In addition, Azure NAT Gateway integration isn't currently supported in secured
virtual hub network (vWAN) architectures. You must deploy using a hub virtual
network architecture. For detailed... | [
0.004768787883222103,
-0.011105497367680073,
0.013387461192905903,
0.023001747205853462,
0.042231813073158264,
-0.006918815430253744,
0.07641048729419708,
0.010818947106599808,
0.013265561312437057,
-0.02337491884827614,
-0.04031571000814438,
-0.01158254873007536,
-0.05897967517375946,
0.0... | {
"azure_component": "security",
"chunk_index": 478,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "454",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
The following example creates and attaches a NAT gateway with an Azure Firewall
subnet using Azure CLI.
Azure CLI
Scale Azure Firewall SNAT ports with NAT Gateway for large workloads
.
Design virtual networks with NAT gateway
Integrat... | [
0.006894491147249937,
-0.02320641651749611,
0.0063221026211977005,
0.02450975589454174,
0.04705343395471573,
0.012920690700411797,
0.032975729554891586,
0.018632976338267326,
0.00006431810470530763,
-0.027191003784537315,
-0.020771756768226624,
-0.020469876006245613,
-0.05073750391602516,
... | {
"azure_component": "security",
"chunk_index": 479,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "455",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Configure Azure Firewall application
rules with SQL FQDNs
Article • 04/13/2023
You can now configure Azure Firewall application rules with SQL FQDNs. This allows you
to limit access from your virtual networks to only the specified SQL server instances.
With SQL FQDNs, you can filter traffic:
From your VNets to an Azure... | [
0.016598325222730637,
0.017809471115469933,
0.028649495914578438,
-0.005043471232056618,
0.07225976884365082,
-0.02019636519253254,
0.04483811929821968,
0.01493550930172205,
0.010725067928433418,
-0.05720909684896469,
-0.04528651759028435,
-0.017906563356518745,
-0.06669627875089645,
0.022... | {
"azure_component": "security",
"chunk_index": 480,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "456",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. Deploy an Azure Firewall using Azure PowerShell.
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL
Managed Instance, ensure the SQL connectivity mode is set to Proxy. To learn how
to switch SQL connectivity mode, see Azure SQL Connectivity Settings.
3. Create a new rule collection with ... | [
0.0071876272559165955,
0.00384433357976377,
-0.0004416109877638519,
-0.0034812879748642445,
0.08457788825035095,
-0.04183199629187584,
0.04822444170713425,
0.007227575872093439,
0.013294772244989872,
-0.07562100142240524,
-0.04086899012327194,
-0.013148576952517033,
-0.06424947082996368,
0... | {
"azure_component": "security",
"chunk_index": 481,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "457",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. Deploy an Azure Firewall using Azure CLI.
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL
Managed Instance, ensure the SQL connectivity mode is set to Proxy. To learn how
to switch SQL connectivity mode, see Azure SQL Connectivity Settings.
3. Add the application rule with the appropr... | [
0.0066401842050254345,
-0.014481372199952602,
-0.0016024509677663445,
-0.01162042934447527,
0.08876299858093262,
-0.052578698843717575,
0.03215719759464264,
0.006420444697141647,
0.002177432645112276,
-0.07515060156583786,
-0.025465132668614388,
0.008849265985190868,
-0.05709007754921913,
... | {
"azure_component": "security",
"chunk_index": 482,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "458",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
4. Access SQL from a virtual machine in a VNet that filters the traffic through the
firewall.
5. Validate that Azure Firewall logs show the traffic is allowed.
To learn about SQL proxy and redirect modes, see Azure SQL Database connectivity
architecture.
Next steps | [
0.05394761264324188,
0.016744105145335197,
0.026949236169457436,
-0.007451076526194811,
0.07416199147701263,
-0.015630513429641724,
0.06420769542455673,
0.00009601886995369568,
-0.004395455587655306,
-0.036133598536252975,
0.0006573855062015355,
-0.0006142430938780308,
-0.05064883455634117,
... | {
"azure_component": "security",
"chunk_index": 483,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "459",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall SNAT private IP address
ranges
Article • 03/19/2025
Azure Firewall provides SNAT capability for all outbound traffic to public IP addresses. By
default, Azure Firewall doesn't SNAT with Network rules when the destination IP address
is in a private IP address range per IANA RFC 1918
or shared address spa... | [
0.029511695727705956,
-0.009196292608976364,
-0.007689193822443485,
-0.010574789717793465,
0.03866781294345856,
-0.006987659260630608,
0.06522264331579208,
0.03171032667160034,
-0.004392324946820736,
-0.036181483417749405,
-0.020732741802930832,
-0.031846705824136734,
-0.04341553896665573,
... | {
"azure_component": "security",
"chunk_index": 484,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "460",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can configure the SNAT private IP addresses using the following methods. Use the
method appropriate for your configuration. Firewalls associated with a firewall policy
must specify the range in the policy and not use AdditionalProperties .
Method
Using classic rules
Using firewall policy
Azure portal
supported
supp... | [
0.004318459890782833,
0.023066559806466103,
-0.023039760068058968,
0.00042870870674960315,
0.06140926480293274,
0.021825753152370453,
0.04014751687645912,
-0.007430199533700943,
0.013961318880319595,
-0.035691093653440475,
-0.02657855674624443,
-0.010157735086977482,
-0.035024017095565796,
... | {
"azure_component": "security",
"chunk_index": 485,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "461",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For more information, see New-AzFirewall.
To configure an existing firewall using classic rules, use the following Azure PowerShell
cmdlets:
Azure PowerShell
$azFw = @{
Name = '<fw-name>'
ResourceGroupName = '<resourcegroup-name>'
Location = '<location>'
VirtualNetworkName = '<vnet-... | [
0.0036563551984727383,
0.00734290387481451,
0.0097176693379879,
0.016623564064502716,
0.08529985696077347,
0.004111168440431356,
0.045383814722299576,
-0.009593036957085133,
0.02108418010175228,
-0.06753473728895187,
-0.07100146263837814,
0.005113729275763035,
-0.07641292363405228,
0.00978... | {
"azure_component": "security",
"chunk_index": 486,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "462",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can use Azure CLI to specify private IP address ranges for the firewall using classic
rules.
For a new firewall using classic rules, use the following Azure CLI command:
Azure CLI
To configure an existing firewall using classic rules, use the following Azure CLI
command:
Azure CLI
Classic rules
New firewall
az netw... | [
0.002610549796372652,
0.012083466164767742,
-0.020778166130185127,
0.0009172300924547017,
0.06752413511276245,
0.013802600093185902,
0.039765309542417526,
0.00971045158803463,
0.032099414616823196,
-0.06568513065576553,
-0.04440879821777344,
0.002072336385026574,
-0.07777237892150879,
0.01... | {
"azure_component": "security",
"chunk_index": 487,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "463",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To configure SNAT during ARM Template deployment, add the following to the
additionalProperties property:
JSON
Azure Firewalls associated with a firewall policy supports SNAT private ranges since API
version 2020-11-01. You can use a template to update the SNAT private range on the
Firewall Policy. The following sampl... | [
0.014272266067564487,
0.016365505754947662,
-0.008455974981188774,
-0.01385457906872034,
0.04433063790202141,
0.017138849943876266,
0.06182156503200531,
-0.034407466650009155,
-0.03026065044105053,
-0.06068453937768936,
-0.03946531563997269,
-0.01677187904715538,
-0.04837538301944733,
0.02... | {
"azure_component": "security",
"chunk_index": 488,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "464",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can use the Azure portal to specify private IP address ranges for the firewall.
1. Select your resource group, and then select your firewall.
2. On the Overview page, Private IP Ranges, select the default value IANA RFC 1918.
The Edit Private IP Prefixes page opens:
3. By default, IANAPrivateRanges is configured.
4... | [
0.02731700986623764,
0.025723466649651527,
0.003118636552244425,
-0.005161142908036709,
0.04580060765147209,
0.003101557493209839,
0.060238733887672424,
0.008009331300854683,
0.022681333124637604,
-0.050188276916742325,
-0.027379563078284264,
-0.015240415930747986,
-0.03488535434007645,
0.... | {
"azure_component": "security",
"chunk_index": 489,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "465",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
JSON
Use the following JSON to associate an Azure Route Server:
JSON
Create a new firewall with a RouteServerId.
Azure PowerShell
{
"type": "Microsoft.Network/firewallPolicies",
"apiVersion": "2022-11-01",
"name": "[parameters('firewallPolicies_DatabasePolicy_name')]",
"location": "eastus",
"properties":... | [
0.03474415838718414,
0.003116146195679903,
-0.005236221011728048,
0.04597930982708931,
0.029395584017038345,
0.003936518914997578,
0.05822655186057091,
0.032218050211668015,
0.0010015517473220825,
-0.04249901324510574,
-0.006326309405267239,
-0.042776498943567276,
-0.09478532522916794,
0.0... | {
"azure_component": "security",
"chunk_index": 490,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "466",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Update an existing firewall with RouteServerId
Azure PowerShell
Create new firewall policy with SNAT parameter provided
Azure PowerShell
Update an existing firewall policy with SNAT
Azure PowerShell
$azureFirewall = New-AzFirewall -Name $azureFirewallName -
ResourceGroupName `
$rgname -Location $location -RouteServer... | [
0.017483210191130638,
-0.018170148134231567,
0.01577526517212391,
0.032595425844192505,
0.06632382422685623,
0.020955407992005348,
0.04998614639043808,
-0.0036418375093489885,
-0.017491986975073814,
-0.054548587650060654,
-0.024778658524155617,
0.00557936355471611,
-0.06455662101507187,
0.... | {
"azure_component": "security",
"chunk_index": 491,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "467",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Get Firewall Learned Prefixes
Azure PowerShell
To configure autolearn SNAT routes (preview) using the Azure portal, follow these steps:
1. Add a subnet:
Add a subnet named RouteServerSubnet to your existing firewall virtual
network.
Ensure the subnet size is at least /27.
2. Deploy a Route Server:
Deploy a Route Server... | [
0.02436303161084652,
-0.041586726903915405,
-0.0066840266808867455,
0.03242252767086029,
0.0560980886220932,
0.01379094086587429,
0.06172016263008118,
0.014292962849140167,
-0.021774346008896828,
-0.033907290548086166,
-0.028125157579779625,
0.006649879738688469,
-0.025371165946125984,
-0.... | {
"azure_component": "security",
"chunk_index": 492,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "468",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Learn about Azure Firewall forced tunneling.
Next steps
Yes
No | [
0.04187050089240074,
-0.03950835391879082,
0.02357017993927002,
0.007724547293037176,
0.0445825420320034,
-0.004796875175088644,
0.05696379393339157,
0.04310736432671547,
0.017115674912929535,
-0.03594408556818962,
0.011003631167113781,
-0.005353728774935007,
-0.044558145105838776,
0.01282... | {
"azure_component": "security",
"chunk_index": 493,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "469",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Configure customer-controlled
maintenance for Azure Firewall
07/09/2025
This article explains how to configure customer-controlled maintenance windows for Azure
Firewall. It provides step-by-step guidance for scheduling maintenance using the Azure portal
or PowerShell.
Azure Firewall is a managed, cloud-based network s... | [
-0.01164388470351696,
0.002976107643917203,
0.02298286184668541,
0.00457985932007432,
0.07126562297344208,
0.0009691699524410069,
0.07650736719369888,
0.012256825342774391,
0.02122270129621029,
-0.02710851840674877,
-0.07002927362918854,
0.006951848976314068,
-0.03633751720190048,
0.027341... | {
"azure_component": "security",
"chunk_index": 494,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "470",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Follow these steps to create a maintenance configuration directly from the Azure Firewall
resource:
1. In the Azure portal, navigate to the Firewall resource for which you want to create a
maintenance configuration.
2. On the Azure Firewall page, navigate to Settings and select Maintenance.
3. Select + Add a configurat... | [
0.020295212045311928,
0.008903694339096546,
-0.002740616677328944,
0.0015239171916618943,
0.08353244513273239,
-0.011206601746380329,
0.06405766308307648,
0.0071313944645226,
0.015517263673245907,
-0.03791305422782898,
-0.051340650767087936,
0.02487523853778839,
-0.07342720031738281,
0.009... | {
"azure_component": "security",
"chunk_index": 495,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "471",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
6. Select Enable to apply the maintenance configuration on the Azure Firewall resource.
Complete the configuration as required to align with your operational needs.
Follow these steps to create a maintenance configuration in the Azure portal using the
Maintenance Configurations page:
1. In the Azure portal, search for ... | [
0.015343180857598782,
0.008925179950892925,
0.012050476856529713,
-0.013244871981441975,
0.09660962224006653,
-0.0015013398369774222,
0.04391324520111084,
0.0034997635520994663,
-0.014617061242461205,
-0.03392525389790535,
-0.06407808512449265,
0.02289922535419464,
-0.058307427912950516,
0... | {
"azure_component": "security",
"chunk_index": 496,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "472",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. On the Basics tab, provide the following details:
Subscription: Select your subscription.
Resource Group: Choose the resource group where your resources are located.
Configuration name: Enter a descriptive name for the maintenance
configuration.
Region: Select the same region as your firewall resources.
Maintenance ... | [
-0.01061747595667839,
0.014282233081758022,
0.031026160344481468,
-0.01573696918785572,
0.10049809515476227,
0.019434312358498573,
0.06194595620036125,
-0.010148323141038418,
-0.007757631596177816,
-0.025163782760500908,
-0.053369443863630295,
0.05324259772896767,
-0.04250236600637436,
0.0... | {
"azure_component": "security",
"chunk_index": 497,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "473",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
5. After specifying the schedule, select Save.
6. Proceed to the Resources tab. Select + Add resources to associate resources with the
maintenance configuration. You can add resources during the creation process or
later. For this example, you're adding resources during the configuration creation.
7. On the Select reso... | [
0.02865971252322197,
0.011929169297218323,
-0.0052605802193284035,
0.024875212460756302,
0.09968117624521255,
-0.005891048349440098,
0.04239107295870781,
0.02603026293218136,
-0.01055361982434988,
-0.0646030530333519,
-0.04629318043589592,
0.026870185509324074,
-0.05301276966929436,
0.0118... | {
"azure_component": "security",
"chunk_index": 498,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "474",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
2. Select the maintenance configuration you want to modify.
3. In the left-hand menu, go to Settings and select Resources. This opens the
Resources page, where you can view all resources associated with the selected
maintenance configuration.
4. On the Resources page, select + Add to include a new resource in the maint... | [
0.024180645123124123,
0.044618379324674606,
-0.0030991968233138323,
0.007290058769285679,
0.11514319479465485,
0.0018826090963557363,
0.03256380185484886,
-0.004248584620654583,
-0.00343685713596642,
-0.05481443926692009,
-0.06337077170610428,
0.045574624091386795,
-0.07293060421943665,
0.... | {
"azure_component": "security",
"chunk_index": 499,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "475",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Secure your Azure Firewall deployment
07/09/2025
Azure Firewall is a managed, cloud-based network security service that protects your Azure
Virtual Network resources. As a fully stateful firewall as a service with built-in high availability
and unrestricted cloud scalability, it's critical to properly configure and sec... | [
0.004090180620551109,
-0.01135922409594059,
0.036765169352293015,
0.022038495168089867,
0.062164146453142166,
0.022351577877998352,
0.053483691066503525,
-0.00871366262435913,
-0.00033841407275758684,
-0.05650223791599274,
-0.04682479798793793,
-0.040740419179201126,
-0.049920983612537384,
... | {
"azure_component": "security",
"chunk_index": 500,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "476",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use forced tunneling for hybrid environments: Configure forced tunneling when you
need to route internet-bound traffic through on-premises security appliances. Enable the
Management NIC to support this configuration while maintaining firewall management
connectivity. For more information, see Azure Firewall forced tunn... | [
-0.003929331433027983,
0.01618722639977932,
-0.012347867712378502,
0.04062667489051819,
0.04337178170681,
-0.013030539266765118,
0.06211560219526291,
0.01781291887164116,
0.0036733124870806932,
-0.03920348361134529,
-0.030607491731643677,
-0.003450564341619611,
-0.05980338528752327,
0.0323... | {
"azure_component": "security",
"chunk_index": 501,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "477",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use URL filtering for granular control: Enable URL filtering to extend FQDN filtering
capabilities to consider entire URLs rather than just domain names. This provides more
precise control over web traffic and reduces the risk of accessing malicious content
through legitimate domains. For more information, see Azure Fi... | [
-0.006155843380838633,
0.0021856999956071377,
0.025388646870851517,
0.007866145111620426,
0.06574214994907379,
-0.0249172355979681,
0.042419154196977615,
-0.04340606555342674,
-0.016737129539251328,
-0.061100441962480545,
-0.033730149269104004,
-0.02532062865793705,
-0.07258349657058716,
0... | {
"azure_component": "security",
"chunk_index": 502,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "478",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
detect malware and analyze threat patterns. For more information, see Detect malware
with Azure Firewall and Microsoft Sentinel.
Monitor threat intelligence alerts: Configure monitoring for threat intelligence alerts to
quickly identify and respond to traffic from known malicious sources. Set up automated
responses for... | [
0.02020144835114479,
-0.009251350536942482,
0.027789615094661713,
-0.0017039163503795862,
0.08017836511135101,
0.004533146042376757,
0.057060740888118744,
-0.009456443600356579,
-0.0021404754370450974,
-0.07489844411611557,
-0.01000506617128849,
-0.008726339787244797,
-0.06356941163539886,
... | {
"azure_component": "security",
"chunk_index": 503,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "479",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
regulated environments. For more information, see Choose the right Azure Firewall SKU
to meet your needs.
Optimize rule configuration for performance: Organize firewall rules using Rule
Collection Groups and Rule Collections, prioritizing them based on frequency of use. Use
IP Groups to reduce the number of individual ... | [
0.017375880852341652,
0.016323978081345558,
0.029280969873070717,
-0.006968439556658268,
0.0760650709271431,
-0.019413627684116364,
0.026458915323019028,
0.012314035557210445,
-0.018296077847480774,
-0.03104718029499054,
-0.02902977541089058,
-0.012943495064973831,
-0.04943028464913368,
0.... | {
"azure_component": "security",
"chunk_index": 504,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "480",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure security baseline for Azure Firewall
Article • 02/25/2025
This security baseline applies guidance from the Microsoft cloud security benchmark version
1.0 to Azure Firewall. The Microsoft cloud security benchmark provides recommendations on
how you can secure your cloud solutions on Azure. The content is grouped b... | [
-0.016993829980492592,
0.01549609936773777,
0.025702714920043945,
0.003991951234638691,
0.05418597161769867,
0.010050775483250618,
0.0703825056552887,
-0.016809267923235893,
-0.0027169755194336176,
-0.03750840574502945,
-0.0021965152118355036,
-0.026555713266134262,
-0.0417059063911438,
0.... | {
"azure_component": "security",
"chunk_index": 505,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "481",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For more information, see the Microsoft cloud security benchmark: Network security.
Description: Service supports deployment into customer's private Virtual Network (VNet).
Learn more.
Supported
Enabled By Default
Configuration Responsibility
True
True
Microsoft
Configuration Guidance: No additional configurations are ... | [
-0.021777162328362465,
-0.025622785091400146,
0.040442924946546555,
0.019178103655576706,
0.07469859719276428,
0.019796794280409813,
0.0715474858880043,
-0.008636604994535446,
-0.010230183601379395,
-0.038997989147901535,
-0.016534753143787384,
-0.01617450639605522,
-0.038065105676651,
0.0... | {
"azure_component": "security",
"chunk_index": 506,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "482",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Effect(s)
Version
Subnets should be
associated with a
Network Security
Group
Protect your subnet from potential threats by
restricting access to it with a Network Security
Group (NSG). NSGs contain a list of Access Control
List (ACL) rules that allow or deny network traffic
to your subnet.
AuditIfNotEx... | [
-0.042472269386053085,
-0.013127150014042854,
0.009583764709532261,
0.02477738820016384,
0.0715254694223404,
-0.021594258025288582,
0.058360807597637177,
-0.020976806059479713,
-0.01860886625945568,
-0.056216299533843994,
0.01693304255604744,
-0.04386124014854431,
-0.0770375058054924,
0.04... | {
"azure_component": "security",
"chunk_index": 507,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "483",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Description: Data plane actions support authentication using managed identities. Learn more.
Supported
Enabled By Default
Configuration Responsibility
False
Not Applicable
Not Applicable
Feature notes: Though managed identities for other services accessing Azure Firewall are not
supported, a managed identity for Azure ... | [
-0.02219540998339653,
0.014781264588236809,
-0.013267086818814278,
0.038664765655994415,
0.07416994124650955,
0.002986000617966056,
0.04942718520760536,
-0.032368164509534836,
-0.0025189875159412622,
-0.04620298743247986,
-0.016910625621676445,
-0.052918870002031326,
-0.09181567281484604,
... | {
"azure_component": "security",
"chunk_index": 508,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "484",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Supported
Enabled By Default
Configuration Responsibility
False
Not Applicable
Not Applicable
Configuration Guidance: This feature is not supported to secure this service.
Description: Data plane supports native use of Azure Key Vault for credential and secrets store.
Learn more.
Supported
Enabled By Default
Configurat... | [
-0.026420312002301216,
0.007125561591237783,
-0.014592397026717663,
0.03530144691467285,
0.09253667294979095,
-0.0017553982324898243,
0.04826760292053223,
-0.025856856256723404,
-0.0036465555895119905,
-0.04058830440044403,
-0.009457450360059738,
-0.037657223641872406,
-0.069642074406147,
... | {
"azure_component": "security",
"chunk_index": 509,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "485",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Supported
Enabled By Default
Configuration Responsibility
False
Not Applicable
Not Applicable
Configuration Guidance: This feature is not supported to secure this service.
Description: Azure Role-Based Access Control (Azure RBAC) can be used to managed access to
service's data plane actions. Learn more.
Supported
Enabl... | [
-0.014668193645775318,
-0.007322495337575674,
-0.00904670637100935,
0.0009708038414828479,
0.09576430171728134,
0.014975334517657757,
0.04856144264340401,
0.0006943728658370674,
-0.016661901026964188,
-0.015621473081409931,
-0.036501068621873856,
-0.024512236937880516,
-0.06867576390504837,
... | {
"azure_component": "security",
"chunk_index": 510,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "486",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For more information, see the Microsoft cloud security benchmark: Data protection.
Description: Tools (such as Azure Purview or Azure Information Protection) can be used for
data discovery and classification in the service. Learn more.
Supported
Enabled By Default
Configuration Responsibility
False
Not Applicable
Not A... | [
-0.029367735609412193,
0.005630937870591879,
-0.020724862813949585,
0.04959338530898094,
0.07726111263036728,
0.018346434459090233,
0.04226098582148552,
-0.01467615831643343,
0.018436739221215248,
-0.04217829182744026,
0.006350181996822357,
-0.035938434302806854,
-0.05643347650766373,
0.03... | {
"azure_component": "security",
"chunk_index": 511,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "487",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Description: Service supports data in-transit encryption for data plane. Learn more.
Supported
Enabled By Default
Configuration Responsibility
True
False
Customer
Feature notes: The customer can enable TLS inspection for traffic transiting through Azure
Firewall, which creates two dedicated TLS connections: one with th... | [
-0.03227318078279495,
-0.018506942316889763,
0.00988303404301405,
0.057464517652988434,
0.08141875267028809,
0.0008329468546435237,
0.05917667970061302,
0.0035117759834975004,
-0.005895834416151047,
-0.030439525842666626,
-0.03835610672831535,
-0.04939274862408638,
-0.08107438683509827,
0.... | {
"azure_component": "security",
"chunk_index": 512,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "488",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
backend.
Configuration Guidance: No additional configurations are required as this is enabled on a
default deployment.
Description: Data at-rest encryption using customer-managed keys is supported for customer
content stored by the service. Learn more.
Supported
Enabled By Default
Configuration Responsibility
False
Not... | [
-0.03598499670624733,
-0.025726839900016785,
-0.005821639206260443,
0.04813012853264809,
0.06789357215166092,
0.03397567570209503,
0.06087413430213928,
-0.003900457639247179,
-0.027569714933633804,
-0.03207525983452797,
-0.04508429765701294,
-0.04537561163306236,
-0.05100788176059723,
0.03... | {
"azure_component": "security",
"chunk_index": 513,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "489",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Description: The service supports Azure Key Vault integration for any customer certificates.
Learn more.
Supported
Enabled By Default
Configuration Responsibility
True
False
Customer
Feature notes: For TLS inspection, Azure Firewall requires customers to use Key Vault to
provide the intermediate certificate used for ge... | [
-0.032321345061063766,
-0.0027420681435614824,
-0.004499639850109816,
0.044579651206731796,
0.06738097220659256,
0.0129591329023242,
0.055132608860731125,
-0.01155482791364193,
0.006719275843352079,
-0.038103796541690826,
-0.04391942545771599,
-0.03820599615573883,
-0.04835308715701103,
0.... | {
"azure_component": "security",
"chunk_index": 514,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "490",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Description: Service configurations can be monitored and enforced via Azure Policy. Learn
more.
Supported
Enabled By Default
Configuration Responsibility
True
False
Customer
Configuration Guidance: Use Microsoft Defender for Cloud to configure Azure Policy to audit
and enforce configurations of your Azure resources. Us... | [
0.00627382704988122,
-0.014376356266438961,
0.00015061278827488422,
-0.01734251342713833,
0.10032281279563904,
0.019172020256519318,
0.04913366213440895,
-0.021289221942424774,
-0.012803084217011929,
-0.03436855599284172,
-0.015009521506726742,
-0.006697195582091808,
-0.08122523128986359,
... | {
"azure_component": "security",
"chunk_index": 515,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "491",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Description: Service produces resource logs that can provide enhanced service-specific metrics
and logging. The customer can configure these resource logs and send them to their own data
sink like a storage account or log analytics workspace. Learn more.
Supported
Enabled By Default
Configuration Responsibility
True
Fa... | [
-0.01725093089044094,
-0.016675764694809914,
-0.00800735130906105,
0.0208190456032753,
0.09728344529867172,
0.017326686531305313,
0.07137911021709442,
0.0050929575227200985,
-0.015236356295645237,
-0.05598794296383858,
-0.03211325779557228,
-0.037958238273859024,
-0.03199390321969986,
0.03... | {
"azure_component": "security",
"chunk_index": 516,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "492",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Description: Service supports its own native backup capability (if not using Azure Backup).
Learn more.
Supported
Enabled By Default
Configuration Responsibility
False
Not Applicable
Not Applicable
Configuration Guidance: This feature is not supported to secure this service.
See the Microsoft cloud security benchmark o... | [
-0.01971234567463398,
-0.07857929170131683,
-0.017550358548760414,
0.012974711135029793,
0.09624451398849487,
0.0038023549132049084,
0.0828961580991745,
-0.011097394861280918,
-0.008848407305777073,
-0.039232444018125534,
-0.001772022689692676,
-0.0045747095718979836,
-0.018232712522149086,
... | {
"azure_component": "security",
"chunk_index": 517,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "493",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
About roles and permissions for Azure
Firewall
Article • 12/20/2024
The Azure Firewall utilizes multiple resources, such as virtual networks and IP addresses,
during both creation and management operations. Because of this, it's essential to verify
permissions on all involved resources during these operations.
You can ... | [
0.0014025965938344598,
-0.0025900586042553186,
0.002772511448711157,
0.02807699330151081,
0.07022810727357864,
-0.001194074866361916,
0.03424154594540596,
-0.009323283098638058,
-0.012157355435192585,
-0.06324733048677444,
-0.05093145743012428,
-0.01190987415611744,
-0.04366495460271835,
0... | {
"azure_component": "security",
"chunk_index": 518,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "494",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Resource
Resource status
Required Azure permissions
Subnet
Use existing
Microsoft.Network/virtualNetworks/subnets/read
Microsoft.Network/virtualNetworks/subnets/join/action
IP addresses
Create new
Microsoft.Network/publicIPAddresses/write
Microsoft.Network/publicIPAddresses/join/action
IP addresses
Use existing
Microso... | [
-0.009602087549865246,
-0.0034031569957733154,
0.004513590130954981,
0.030808614566922188,
0.0665053278207779,
0.0025305242743343115,
0.04028557240962982,
0.003703259164467454,
-0.003512571332976222,
-0.04637952893972397,
-0.020555032417178154,
-0.0364692360162735,
-0.07244427502155304,
0.... | {
"azure_component": "security",
"chunk_index": 519,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "495",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
To view roles and permissions for other services, see the following links:
Azure Application Gateway
Azure ExpressRoute
Azure Route Server
Azure Virtual WAN
Managed NVA
Azure VPN Gateway
What is Azure Role Based Access Azure Role Base... | [
0.022395333275198936,
-0.00255505065433681,
-0.007728411350399256,
-0.017951350659132004,
0.051492080092430115,
-0.014204633422195911,
0.0500626340508461,
0.025206536054611206,
0.002763959812000394,
-0.078029565513134,
0.014486901462078094,
0.005274441093206406,
-0.014646904543042183,
0.04... | {
"azure_component": "security",
"chunk_index": 520,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "496",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall integration in Microsoft
Security Copilot
Article • 04/25/2025
Security Copilot is a generative AI-powered security solution that helps increase the efficiency
and capabilities of security personnel to improve security outcomes at machine speed and
scale. It provides a natural language, assistive copilot... | [
-0.014815114438533783,
-0.012436493299901485,
0.0024139981251209974,
0.06869255006313324,
0.05770315229892731,
-0.002689882181584835,
0.0669826790690422,
0.009154188446700573,
-0.0004916266188956797,
-0.055806733667850494,
-0.040393128991127014,
-0.04648134484887123,
-0.07148268818855286,
... | {
"azure_component": "security",
"chunk_index": 521,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "497",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Copilot in Azure (embedded experience) in the Azure portal:
For more information, see Microsoft Security Copilot experiences and Microsoft Copilot in
Azure capabilities.
| [
0.0032389650586992502,
0.004519845824688673,
-0.019602593034505844,
0.027959059923887253,
0.08526674658060074,
-0.00036713978624902666,
0.021588988602161407,
0.04002055898308754,
0.0016458483878523111,
-0.053798917680978775,
-0.010893124155700207,
-0.05753987655043602,
-0.055445410311222076,... | {
"azure_component": "security",
"chunk_index": 522,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "498",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Security Copilot has built-in system features that can get data from the different plugins that
are turned on.
To view the list of built-in system capabilities for Azure Firewall, use the following procedure on
the Security Copilot portal:
1. In the prompt bar, select the Prompts icon.
2. Select See all system capabili... | [
-0.013705914840102196,
0.03003755211830139,
-0.0005554634844884276,
0.026984810829162598,
0.10469581931829453,
0.006970285903662443,
0.04350826144218445,
-0.0181124284863472,
0.016096103936433792,
-0.06698595732450485,
-0.044970326125621796,
-0.02826787531375885,
-0.07062864303588867,
0.00... | {
"azure_component": "security",
"chunk_index": 523,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "499",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
4. Enter your prompt in the prompt bar on either the Security Copilot portal
or via the
Copilot in Azure experience in the Azure portal.
There are many prompts you can use to get information from Azure Firewall. This section lists
the ones that work best today. They're continuously updated as new capabilities are laun... | [
-0.008436671458184719,
0.002906970912590623,
0.029083216562867165,
0.023577818647027016,
0.057030703872442245,
0.0012543955817818642,
0.05221286788582802,
0.02047707699239254,
0.013952895998954773,
-0.0402248241007328,
-0.05551620200276375,
-0.05135475844144821,
-0.059205085039138794,
0.00... | {
"azure_component": "security",
"chunk_index": 524,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "500",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
| [
0.012244628742337227,
0.03951352834701538,
-0.007785348687320948,
0.0021321566309779882,
0.046604953706264496,
0.012159344740211964,
0.03977902606129646,
0.042079344391822815,
-0.020763538777828217,
-0.03903518617153168,
0.02428344637155533,
-0.008056442253291607,
-0.04972238466143608,
0.0... | {
"azure_component": "security",
"chunk_index": 525,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "501",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Sample prompts:
Has there been any malicious traffic intercepted by my Firewall <Firewall name> ?
What are the top 20 IDPS hits from the last seven days for Firewall <Firewall name> in
resource group <resource group name> ?
Show me in tabular form the top 50 attacks that targeted Firewall <Firewall name> in
subscript... | [
-0.0025855873245745897,
-0.01620742678642273,
0.04293868690729141,
0.017809318378567696,
0.04763321951031685,
0.021760620176792145,
0.05189461261034012,
-0.027226921170949936,
0.00018290634034201503,
-0.016879823058843613,
-0.017315270379185677,
-0.018152104690670967,
-0.04307856783270836,
... | {
"azure_component": "security",
"chunk_index": 526,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "502",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
| [
0.012244628742337227,
0.03951352834701538,
-0.007785348687320948,
0.0021321566309779882,
0.046604953706264496,
0.012159344740211964,
0.03977902606129646,
0.042079344391822815,
-0.020763538777828217,
-0.03903518617153168,
0.02428344637155533,
-0.008056442253291607,
-0.04972238466143608,
0.0... | {
"azure_component": "security",
"chunk_index": 527,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "503",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Sample prompts:
Explain why IDPS flagged the top hit as high severity and the fifth hit as low severity.
What can you tell me about this attack? What are the other attacks this attacker is known
for?
I see that the third signature ID is associated with CVE <CVE number\> , tell me more about
this CVE.
Perform a fleet-wi... | [
-0.015305021777749062,
0.008808571845293045,
0.03539250046014786,
0.0393335334956646,
0.04129170626401901,
0.0012914803810417652,
0.04383600503206253,
-0.00020780274644494057,
0.00792920496314764,
-0.030639326199889183,
0.0063306656666100025,
-0.03790261596441269,
-0.06437928229570389,
-0.... | {
"azure_component": "security",
"chunk_index": 528,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "504",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Sample prompts:
Was signature ID <ID number\> only stopped by this one Firewall? What about others
across this entire tenant?
Was the top hit seen by any other Firewall in the subscription <subscription name> ?
Over the past week did any Firewall in resource group <resource group name\> see
signature ID <ID number> ?... | [
-0.013365207239985466,
-0.017107434570789337,
0.026499450206756592,
0.018831931054592133,
0.04717957600951195,
0.014047340489923954,
0.06691441684961319,
0.0037058615125715733,
-0.011330517940223217,
-0.02026483230292797,
0.001003711367957294,
-0.02758081816136837,
-0.0484442375600338,
-0.... | {
"azure_component": "security",
"chunk_index": 529,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "505",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Sample prompts:
How do I protect myself from future attacks from this attacker across my entire
infrastructure?
| [
0.03543059527873993,
-0.020149748772382736,
0.006215434055775404,
0.05153224989771843,
0.06925365328788757,
-0.0005185159971006215,
0.055412258952856064,
-0.006627467926591635,
-0.019285235553979874,
-0.029830452054739,
0.00020857687923125923,
0.00951759610325098,
-0.08714152127504349,
-0.... | {
"azure_component": "security",
"chunk_index": 530,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "506",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
If I want to make sure all my Azure Firewalls are protected against attacks from signature
ID <ID number\> , how do I accomplish this?
What is the difference in risk between alert only and alert and block modes for IDPS?
Your feedback is vital to guide the current and planned development of the product. The best
way to... | [
0.004110340960323811,
-0.0018185930093750358,
0.01866847649216652,
0.028622901067137718,
0.052119843661785126,
-0.004181093070656061,
0.037550270557403564,
-0.013707922771573067,
0.012847046367824078,
-0.057442907243967056,
-0.022115686908364296,
-0.014209680259227753,
-0.0788632482290268,
... | {
"azure_component": "security",
"chunk_index": 531,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "507",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
When you interact with Security Copilot either through the Security Copilot portal or the
Copilot in Azure experience to get information, Copilot pulls that data from Azure Firewall. The
prompts, the data retrieved, and the output shown in the prompt results are processed and
stored within the Copilot service. For more... | [
-0.007464817725121975,
0.004100549966096878,
0.004379524849355221,
0.06784222275018692,
0.07682711631059647,
-0.018506424501538277,
0.015022533014416695,
0.025594113394618034,
-0.006348620634526014,
-0.028566820546984673,
-0.03963354229927063,
-0.043936390429735184,
-0.08754764497280121,
0... | {
"azure_component": "security",
"chunk_index": 532,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "508",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use Azure Firewall to protect Azure
Virtual Desktop deployments
Article • 03/19/2025
Azure Virtual Desktop is a cloud virtual desktop infrastructure (VDI) service that runs on
Azure. When an end user connects to Azure Virtual Desktop, their session comes from a
session host in a host pool. A host pool is a collection o... | [
0.03449280932545662,
0.014560142531991005,
0.03422306105494499,
0.0331682413816452,
0.05748136714100838,
0.011819292791187763,
0.046816956251859665,
0.013254053890705109,
-0.024119753390550613,
-0.046207770705223083,
-0.0656377449631691,
-0.017147159203886986,
-0.0347137451171875,
0.024550... | {
"azure_component": "security",
"chunk_index": 533,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "509",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The Azure virtual machines you create for Azure Virtual Desktop must have access to
several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall uses
the Azure Virtual Desktop FQDN tag WindowsVirtualDesktop to simplify this
configuration. You need to create an Azure Firewall Policy and create Rule... | [
0.00944033544510603,
0.011327076703310013,
0.015909934416413307,
0.028036756440997124,
0.057530611753463745,
-0.025464221835136414,
0.05211962014436722,
0.007836044766008854,
-0.0092600267380476,
-0.03016742877662182,
-0.0736147090792656,
-0.016950609162449837,
-0.05605766922235489,
0.0480... | {
"azure_component": "security",
"chunk_index": 534,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "510",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Depending on your organization needs, you might want to enable secure outbound
internet access for your end users. If the list of allowed destinations is well-defined (for
example, for Microsoft 365 access), you can use Azure Firewall... | [
0.009464623406529427,
-0.007283923216164112,
0.010511599481105804,
-0.010719765909016132,
0.07199274748563766,
-0.04647552967071533,
0.06591032445430756,
-0.004560473840683699,
-0.019175173714756966,
-0.049338676035404205,
-0.055385321378707886,
-0.033898040652275085,
-0.0455494225025177,
... | {
"azure_component": "security",
"chunk_index": 535,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "511",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use Azure Firewall to protect Azure
Kubernetes Service (AKS) clusters
Article • 10/01/2024
This article shows you how you can protect Azure Kubernetes Service (AKS) clusters by
using Azure Firewall to secure outbound and inbound traffic.
Azure Kubernetes Service (AKS) offers a managed Kubernetes cluster on Azure. For m... | [
-0.04401761293411255,
0.001631184364669025,
-0.004018488805741072,
0.015890147536993027,
0.041247446089982986,
0.005894314497709274,
0.04433701932430267,
-0.013200716115534306,
-0.016676804050803185,
-0.048498719930648804,
-0.052027296274900436,
-0.06563179939985275,
-0.04604301601648331,
... | {
"azure_component": "security",
"chunk_index": 536,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "512",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The simplest solution uses a firewall device that can control outbound traffic based on
domain names. A firewall typically establishes a barrier between a trusted network and
an untrusted network, such as the Internet. Azure Firewall, for example, can restrict
outbound HTTP and HTTPS traffic based on the FQDN of the de... | [
-0.00437295762822032,
0.022390300408005714,
0.020977213978767395,
-0.0004910611314699054,
0.0753602385520935,
-0.044568322598934174,
0.036990683525800705,
-0.01730475388467312,
-0.020157258957624435,
-0.06049717590212822,
-0.03546035662293434,
-0.020867357030510902,
-0.07177871465682983,
0... | {
"azure_component": "security",
"chunk_index": 537,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "513",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Define a set of environment variables to be used in resource creations.
Bash
Create a virtual network with two separate subnets, one for the cluster, one for the
firewall. Optionally you could also create one for internal service ingress.
Create a resource group to hold all of the resources.
Restrict egress traffic usi... | [
0.01757265068590641,
0.001344763208180666,
0.011146564967930317,
0.019769566133618355,
0.11253495514392853,
0.04249352589249611,
0.05100822076201439,
0.007287149783223867,
-0.022217869758605957,
-0.06759413331747055,
-0.04148908704519272,
-0.04337542876601219,
-0.063949353992939,
0.0288594... | {
"azure_component": "security",
"chunk_index": 538,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "514",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure CLI
Create a virtual network with two subnets to host the AKS cluster and the Azure Firewall.
Each has their own subnet. Let's start with the AKS network.
Azure CLI
Azure Firewall inbound and outbound rules must be configured. The main purpose of
the firewall is to enable organizations to configure granular ingre... | [
-0.012386379763484001,
-0.0130773251876235,
0.007538309786468744,
0.016177861019968987,
0.07261669635772705,
0.0032878313213586807,
0.041775837540626526,
-0.0019282858120277524,
0.011342082172632217,
-0.02766294777393341,
-0.030622446909546852,
-0.032942451536655426,
-0.05766153708100319,
... | {
"azure_component": "security",
"chunk_index": 539,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "515",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Create a standard SKU public IP resource that is used as the Azure Firewall frontend
address.
Azure CLI
Register the preview cli-extension to create an Azure Firewall.
Azure CLI
The IP address created earlier can now be assigned to the firewall frontend.
) Important
If your cluster or application creates a large number... | [
-0.025671662762761116,
-0.01089439820498228,
-0.013736188411712646,
0.027681758627295494,
0.04182187095284462,
0.020377563312649727,
0.025667086243629456,
0.06140916422009468,
0.0064747631549835205,
-0.029361309483647346,
-0.03568563237786293,
-0.04061435908079147,
-0.0789220929145813,
-0.... | {
"azure_component": "security",
"chunk_index": 540,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "516",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure CLI
When the previous command has succeeded, save the firewall frontend IP address for
configuration later.
Azure CLI
Azure automatically routes traffic between Azure subnets, virtual networks, and on-
premises networks. If you want to change any of Azure's default routing, you do so by
creating a route table.
Cr... | [
-0.01900719292461872,
-0.00430371193215251,
-0.014847418293356895,
-0.0007837148732505739,
0.07335557043552399,
-0.02335691638290882,
0.05558478459715843,
0.04799753800034523,
0.02873874641954899,
-0.04503726586699486,
-0.032473597675561905,
-0.03752951696515083,
-0.07622680813074112,
0.01... | {
"azure_component": "security",
"chunk_index": 541,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "517",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure CLI
See virtual network route table documentation about how you can override Azure's
default system routes or add more routes to a subnet's route table.
You can use the following three network rules to configure your firewall. You might need
to adapt these rules based on your deployment. The first rule allows acc... | [
-0.021749859675765038,
0.009434414096176624,
-0.0005910378531552851,
0.009506161324679852,
0.07218056172132492,
-0.02340473048388958,
0.0540805384516716,
0.04541030526161194,
0.010260037146508694,
-0.05499480292201042,
-0.02072732523083687,
-0.015322287566959858,
-0.07716377079486847,
0.04... | {
"azure_component": "security",
"chunk_index": 542,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "518",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure CLI
Azure CLI
See Azure Firewall documentation to learn more about the Azure Firewall service.
To associate the cluster with the firewall, the dedicated subnet for the cluster's subnet
must reference the route table created previously. Association can be done by issuing a
command to the virtual network holding bo... | [
-0.003910102415829897,
-0.007088889833539724,
-0.008213373832404613,
0.01687927544116974,
0.06656057387590408,
0.0031744209118187428,
0.029783355072140694,
0.027146806940436363,
0.005775675177574158,
-0.025536496192216873,
-0.04989456385374069,
-0.0330619253218174,
-0.08627958595752716,
0.... | {
"azure_component": "security",
"chunk_index": 543,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "519",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
through the firewall and no other egress paths exist (by default the Load Balancer
outbound type could be used).
The target subnet to be deployed into is defined with the environment variable,
$SUBNETID . We didn't define the $SUBNETID variable in the previous steps. To set the
value for the subnet ID, you can use the... | [
-0.006170446518808603,
-0.029498443007469177,
-0.007077798712998629,
-0.005814942065626383,
0.07639270275831223,
0.023402871564030647,
0.0517193041741848,
-0.003539408789947629,
-0.004260801710188389,
-0.045803043991327286,
-0.012028791010379791,
-0.06558948010206223,
-0.0810505598783493,
... | {
"azure_component": "security",
"chunk_index": 544,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "520",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure CLI
If you used authorized IP ranges for the cluster on the previous step, you must add your
developer tooling IP addresses to the AKS cluster list of approved IP ranges in order to
access the API server from there. Another option is to configure a jumpbox with the
needed tooling inside a separate subnet in the F... | [
-0.009560167789459229,
-0.0013238538522273302,
-0.05143706873059273,
-0.004122617654502392,
0.05476486682891846,
-0.003156850812956691,
0.044956620782613754,
0.01414573099464178,
0.0021392134949564934,
-0.04122672602534294,
0.0013458464527502656,
-0.05171985924243927,
-0.0724148079752922,
... | {
"azure_component": "security",
"chunk_index": 545,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "521",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use the az aks get-credentials command to configure kubectl to connect to your newly
created Kubernetes cluster.
Azure CLI
You can now start exposing services and deploying applications to this cluster. In this
example, we expose a public service, but you can also choose to expose an internal
service via internal load... | [
-0.04097357392311096,
0.025463299825787544,
-0.019745448604226112,
-0.013150890357792377,
0.05411086231470108,
0.03343866392970085,
0.044477224349975586,
0.025872131809592247,
0.019590875133872032,
-0.01738813892006874,
-0.05393931269645691,
-0.03812252730131149,
-0.059516582638025284,
0.0... | {
"azure_component": "security",
"chunk_index": 546,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "522",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To configure inbound connectivity, a DNAT rule must be written to the Azure Firewall. To
test connectivity to your cluster, a rule is defined for the firewall frontend public IP
address to route to the internal IP exposed by the internal service.
The destination address can be customized as it's the port on the firewal... | [
-0.03340085223317146,
-0.011033857241272926,
-0.012706798501312733,
-0.013786635361611843,
0.04141179099678993,
0.0018048543715849519,
0.04306239262223244,
-0.005533796269446611,
0.04402720928192139,
-0.05613046884536743,
-0.010089050978422165,
-0.06121240556240082,
-0.0597679503262043,
0.... | {
"azure_component": "security",
"chunk_index": 547,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "523",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
EXTERNAL-IP PORT(S)
AGE
kubernetes ClusterIP 10.41.0.1 <none> 443/TCP
10h
store-front LoadBalancer 10.41.185.82 203.0.113.254
80:32718/TCP 9m
order-service ClusterIP 10.0.104.144 <none> 3000/TCP
11s
product-service Clus... | [
-0.03619209676980972,
-0.026030221953988075,
0.018725167959928513,
-0.046063728630542755,
0.048826344311237335,
0.059693463146686554,
-0.0022712370846420527,
0.028921257704496384,
-0.01834348775446415,
-0.029094912111759186,
0.03147965297102928,
-0.04131197929382324,
-0.05609459429979324,
... | {
"azure_component": "security",
"chunk_index": 548,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "523",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Get the service IP by running:
Bash
Add the NAT rule by running:
Azure CLI
Navigate to the Azure Firewall frontend IP address in a browser to validate connectivity.
You should see the AKS store app. In this example, the Firewall public IP was
203.0.113.32 .
On this page, you can view products, add them to your cart, an... | [
-0.04345902428030968,
-0.007858896628022194,
-0.02455459162592888,
0.008671106770634651,
0.03880435973405838,
0.02518545277416706,
0.0845215693116188,
0.050839174538850784,
0.014507127925753593,
-0.019761746749281883,
-0.01188973244279623,
-0.04423903301358223,
-0.07686284929513931,
0.0048... | {
"azure_component": "security",
"chunk_index": 549,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "524",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
To clean up Azure resources, delete the AKS resource group.
Azure CLI
Learn more about Azure Kubernetes Service, see Kubernetes core concepts for
Azure Kubernetes Service (AKS).
az group delete -g $RG
Next steps
Yes
No | [
-0.027672400698065758,
0.00230196095071733,
0.021508386358618736,
0.013076560571789742,
0.04206607863306999,
0.0029789297841489315,
0.05433150380849838,
0.040156908333301544,
0.02534114569425583,
-0.030461376532912254,
-0.03745095059275627,
-0.02902563102543354,
-0.057034339755773544,
0.05... | {
"azure_component": "security",
"chunk_index": 550,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "525",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use Azure Firewall to protect Microsoft
365
Article • 04/03/2025
You can use the Azure Firewall built-in Service Tags and FQDN tags to allow outbound
communication to Microsoft 365 endpoints and IP addresses.
For each Microsoft 365 product and category, Azure Firewall automatically retrieves the
required endpoints and ... | [
0.013127248734235764,
0.004502307623624802,
0.006165261380374432,
0.0068143378011882305,
0.051230113953351974,
-0.026486601680517197,
0.030191494151949883,
0.0011893141781911254,
0.011272319592535496,
-0.029656479135155678,
-0.04552210867404938,
-0.025242706760764122,
-0.07199443876743317,
... | {
"azure_component": "security",
"chunk_index": 551,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "526",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For a Service Tag – this specific combination exists and has required IPv4 addresses
listed.
For an FQDN Rule – this specific combination exists and has required FQDNs listed
which communicate to ports 80/443.
Tags are updated automatically with any modifications to the required IPv4 addresses
and FQDNs. New tags might... | [
-0.01877264678478241,
-0.0205288827419281,
0.024919740855693817,
-0.02012547478079796,
0.04988297447562218,
-0.04169109836220741,
-0.0073064700700342655,
-0.015461165457963943,
-0.0468759685754776,
-0.03220769390463829,
-0.03260756656527519,
-0.004173350520431995,
-0.07609987258911133,
0.0... | {
"azure_component": "security",
"chunk_index": 552,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "527",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Application rule collection:
These built-in tags provide granularity to allow and protect the outbound traffic to
Microsoft 365 based on your preferences and usage. You can allow outbound traffic
only to specific products and categories for a specific source. You can also use Azure
Firewall Premium’s TLS Inspection and... | [
0.016938481479883194,
0.004620864521712065,
0.03533588722348213,
-0.018453344702720642,
0.06626664102077484,
-0.07185698300600052,
0.023237591609358788,
0.000440567615441978,
-0.03255483880639076,
-0.01747625507414341,
-0.03455742076039314,
-0.0060263825580477715,
-0.0785810574889183,
0.02... | {
"azure_component": "security",
"chunk_index": 553,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "528",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
communication to these FQDNs, create your own network rules with these FQDNs and
ports. For more information, see Use FQDN filtering in network rules.
For more information, see Protect Microsoft 365 and Windows 365 with Azure
Firewall... | [
0.015374119393527508,
-0.014229408465325832,
0.013579975813627243,
0.006574598606675863,
0.08191429823637009,
-0.02062256634235382,
0.02379048429429531,
0.0077035208232700825,
-0.008434289135038853,
-0.04627688601613045,
0.0036764508113265038,
0.006388248410075903,
-0.06504635512828827,
0.... | {
"azure_component": "security",
"chunk_index": 554,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "529",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall with Microsoft Sentinel
overview
Article • 10/10/2023
You can now get both detection and prevention in the form of an easy-to-deploy Azure
Firewall solution for Azure Sentinel.
Security is a constant balance between proactive and reactive defenses. They're both
equally important, and neither can be negle... | [
-0.004342203959822655,
-0.061108626425266266,
0.04283374175429344,
-0.018171150237321854,
0.058808308094739914,
-0.007804097607731819,
0.05069243162870407,
-0.004764896351844072,
0.010653645731508732,
-0.06516807526350021,
-0.024974524974822998,
-0.03320544958114624,
-0.03588172420859337,
... | {
"azure_component": "security",
"chunk_index": 555,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "530",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Once installed, select Manage follow all the steps in the wizard, pass validation, and
create the solution. With just a few selections, all content, including connectors,
detections, workbooks, and playbooks are deployed in your Microsoft Sentinel
workspace.
The Azure Firewall workbook allows you to visualize Azure Fir... | [
0.01814703270792961,
0.005330018233507872,
0.004223375115543604,
-0.007306715473532677,
0.0935136079788208,
-0.05031893402338028,
0.037386998534202576,
-0.008851161226630211,
-0.0026553876232355833,
-0.0760309174656868,
-0.06011492386460304,
-0.01617373153567314,
-0.03975957632064819,
0.02... | {
"azure_component": "security",
"chunk_index": 556,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "531",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Detection rule
What does it do?
What does it indicate?
Port scan
Identifies a source IP scanning
multiple open ports on the Azure
Firewall.
Malicious scanning of ports by an
attacker, trying to reveal open ports in
the organization that can be
compromised for initial access.
Port sweep
Identifies a source IP scanning t... | [
-0.04371977970004082,
-0.029133638367056847,
-0.01104773860424757,
-0.0016308026388287544,
0.04597332701086998,
-0.02903122268617153,
0.051473408937454224,
-0.02244681306183338,
-0.026340395212173462,
-0.04223813861608505,
0.0023825124371796846,
-0.02957507222890854,
-0.06482382863759995,
... | {
"azure_component": "security",
"chunk_index": 557,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "532",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
built-in Azure Sentinel hunting queries in the Azure Firewall
solution give security researchers the tools they need to find high-impact activities from
the firewall logs. Several examples include:
Hunting query
What does it do?
What does it indicate?
First time a
source IP
connects to
destination port
Helps to identif... | [
-0.017822181805968285,
-0.029224291443824768,
0.002272246405482292,
-0.02086823619902134,
0.03961161524057388,
-0.013067271560430527,
0.056521959602832794,
0.02066393941640854,
0.010354232043027878,
-0.046393003314733505,
-0.030439838767051697,
-0.01817719265818596,
-0.075474314391613,
0.0... | {
"azure_component": "security",
"chunk_index": 558,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "532",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.