text stringlengths 0 3.99k | embedding listlengths 768 768 | metadata dict |
|---|---|---|
Hunting query
What does it do?
What does it indicate?
First time source
IP connects to a
destination
Helps to identify an IOA when
malicious communication is
done for the first time from
machines that never accessed
the destination before.
Based on learning the regular traffic during
a specified period.
Source IP
abnor... | [
-0.04366971179842949,
-0.04069862142205238,
-0.02389516495168209,
-0.02342492900788784,
0.05872850865125656,
-0.038684748113155365,
0.019957609474658966,
0.03124576434493065,
-0.01231657899916172,
-0.04492225497961044,
0.0017237792490050197,
-0.043762754648923874,
-0.08722274750471115,
0.0... | {
"azure_component": "security",
"chunk_index": 559,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "533",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
A sales representative in the company has accidentally opened a phishing email and
opened a PDF file containing malware. The malware immediately tries to connect to a
malicious website but Azure Firewall blocks it. The firewall detected the domain using
the Microsoft threat intelligence feed it consumes.
The connection... | [
-0.008059858344495296,
-0.03736472874879837,
-0.02771034650504589,
0.030290227383375168,
0.08411277085542679,
-0.01956801488995552,
0.05026676133275032,
-0.011496469378471375,
0.02105339989066124,
-0.05600768327713013,
-0.0013085086829960346,
0.002892941003665328,
-0.06479738652706146,
0.0... | {
"azure_component": "security",
"chunk_index": 560,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "534",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Detect malware with Microsoft Sentinel
for Azure Firewall
Article • 01/23/2024
Malware is any software that is designed to cause damage, disruption, or compromise
the security and functionality of computer systems, networks, or devices. It includes
diverse types of threats, such as viruses, worms, trojans, ransomware, ... | [
0.008273771032691002,
-0.03475996479392052,
0.01927986368536949,
0.005462556146085262,
0.0633852407336235,
-0.0019209147430956364,
0.051779843866825104,
-0.0016861128387972713,
0.019546670839190483,
-0.07065296173095703,
-0.010231542401015759,
-0.009893754497170448,
-0.044158924371004105,
... | {
"azure_component": "security",
"chunk_index": 561,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "535",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Due to the recent surge in cryptocurrency mining, there's an increasing need for high-
performance network processing units. Distributed computing is expanding and the
widespread availability of mining software, both in legal and illegal contexts.
Coinminer represents a type of malware that uses the hardware resources... | [
0.025829052552580833,
-0.008732210844755173,
-0.041910320520401,
0.011191774159669876,
0.04834699630737305,
0.0014048543525859714,
0.01670835167169571,
0.024430016055703163,
0.01535481121391058,
-0.03675936162471771,
0.00861268863081932,
0.011696591973304749,
-0.059594884514808655,
0.05428... | {
"azure_component": "security",
"chunk_index": 562,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "536",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
=
column_ifexists("transactionId_g", "")
| where DestinationPort in (coinminerPorts) // Filter traffic on known
coinminer ports
| summarize CoinminerAttempts = count() by DestinationHost, DestinationPort
| where CoinminerAttempts > 10 // Adjust threshold as needed
),
(AZFWIdpsSignature
| where DestinationPo... | [
0.008084705099463463,
0.00869721919298172,
0.02948756515979767,
-0.027510497719049454,
0.10635312646627426,
-0.0000960846955422312,
0.021155312657356262,
-0.012695703655481339,
-0.003262526821345091,
-0.029236776754260063,
0.017849385738372803,
0.025016602128744125,
-0.08260149508714676,
0... | {
"azure_component": "security",
"chunk_index": 563,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "536",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
(AzureDiagnostics
| where ResourceType == "AZUREFIREWALLS"
| where Category == "AzureFirewallDnsProxy"
| parse msg_s with "DNS Request: " ClientIP ":" ClientPort " - " QueryID " "
Request_Type " " Request_Class " " Request_Name ". " Request_Protocol " "
Request_Size " " EDNSO_DO " " EDNS0_Buffersize " " Respons... | [
-0.03048868104815483,
-0.017063332721590996,
-0.0359194278717041,
0.010755563154816628,
0.05681290477514267,
0.022653650492429733,
0.07124434411525726,
0.007777051068842411,
0.0012445144820958376,
-0.055013205856084824,
0.006654407363384962,
-0.026457546278834343,
-0.057145457714796066,
0.... | {
"azure_component": "security",
"chunk_index": 564,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "537",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Cl0p is a ransomware that operates by applying distinctive encryption keys to the
victim's files and then requesting a ransom for the files' decryption. It uses a
vulnerability in the data transfer software MOVEit and sends spear phishing emails to
numerous employees in the hope to deliver cl0p . Then it uses tools li... | [
-0.016744812950491905,
-0.06980807334184647,
0.018040748313069344,
0.012302041053771973,
0.060045868158340454,
-0.027083823457360268,
0.018389325588941574,
0.04038303717970848,
0.016644200310111046,
-0.042111728340387344,
-0.04435350000858307,
-0.04530451074242592,
-0.0635194405913353,
0.0... | {
"azure_component": "security",
"chunk_index": 565,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "538",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Migrate to Azure Firewall Premium
Article • 03/15/2023
You can migrate Azure Firewall Standard to Azure Firewall Premium to take advantage of
the new Premium capabilities. For more information about Azure Firewall Premium
features, see Azure Firewall Premium features.
This article guides you with the required steps to ... | [
-0.005909798666834831,
-0.012794666923582554,
0.038550589233636856,
-0.008540647104382515,
0.07587277889251709,
0.0023745927028357983,
0.05984227731823921,
0.004913363605737686,
0.03959910199046135,
-0.022638019174337387,
-0.04219914600253105,
-0.02991124428808689,
-0.0392380990087986,
0.0... | {
"azure_component": "security",
"chunk_index": 566,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "539",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Performance is a consideration when migrating from the standard SKU. IDPS and TLS
inspection are compute intensive operations. The premium SKU uses a more powerful
VM SKU, which scales to a higher throughput comparable with the standard SKU. For
more information about Azure Firewall Performance, see Azure Firewall Perf... | [
-0.013736573979258537,
0.00198484119027853,
0.029605837538838387,
0.028140461072325706,
0.07747729867696762,
0.0023313299752771854,
0.04675452038645744,
0.013260697945952415,
0.02621915191411972,
-0.022933494299650192,
-0.018748294562101364,
-0.04217297211289406,
-0.04823501035571098,
0.01... | {
"azure_component": "security",
"chunk_index": 567,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "540",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Transform-Policy.ps1 is an Azure PowerShell script that creates a new Premium policy
from an existing Standard policy.
Given a standard firewall policy ID, the script transforms it to a Premium Azure firewall
policy. The script first connects to your Azure account, pulls the policy, transforms/adds
various parameters, ... | [
-0.0300523079931736,
0.0000723396660760045,
0.023491578176617622,
0.002021076390519738,
0.08690702170133591,
0.013532592914998531,
0.0018538287840783596,
-0.03240543231368065,
0.010486334562301636,
-0.033846545964479446,
-0.026646429672837257,
-0.004240684676915407,
-0.06790202856063843,
-... | {
"azure_component": "security",
"chunk_index": 568,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "541",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
param (
#Resource id of the azure firewall policy.
[Parameter(Mandatory=$true)]
[string]
$PolicyId,
#new filewallpolicy name, if not specified will be the previous name
with the '_premium' suffix
[Parameter(Mandatory=$false)]
[string]
$NewPolicyName = ""
)
$ErrorActionPreference = "Sto... | [
-0.019752943888306618,
-0.006977949291467667,
0.013605884276330471,
0.03362194076180458,
0.05074996501207352,
0.039798978716135025,
0.018538599833846092,
-0.0476045198738575,
-0.004544560797512531,
-0.02917247824370861,
-0.02794237993657589,
-0.008839068002998829,
-0.05572301521897316,
0.0... | {
"azure_component": "security",
"chunk_index": 569,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "542",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
}
function TransformPolicyToPremium {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicy]
$Policy
)
$NewPolicyParameters = @{
Name = (GetPolicyNewName -Policy $Policy)
... | [
-0.028713926672935486,
-0.03213336318731308,
0.029506780207157135,
0.008736318908631802,
0.0660586953163147,
0.0026969732716679573,
0.04162583872675896,
-0.07330825924873352,
-0.008619053289294243,
-0.04581975191831589,
-0.020683065056800842,
-0.010455548763275146,
-0.075788713991642,
0.03... | {
"azure_component": "security",
"chunk_index": 570,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "543",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
If you use Azure Firewall Standard SKU with firewall policy, you can use the
Allocate/Deallocate method to migrate your Firewall SKU to Premium. This migration
approach is supported on both VNet Hub and Secure Hub Firewalls. When you migrate
a Secure Hub deployment, it will preserve the firewall public IP address.
The ... | [
-0.028687484562397003,
-0.007475772872567177,
0.04217136278748512,
0.03070172294974327,
0.0683760941028595,
0.008560135960578918,
0.040842205286026,
-0.009969540871679783,
0.019987942650914192,
-0.01329178735613823,
-0.06716439872980118,
-0.006151055451482534,
-0.07735387980937958,
0.00459... | {
"azure_component": "security",
"chunk_index": 571,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "544",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Allocate Firewall Premium (multiple public IP addresses)
Azure PowerShell
Allocate Firewall Premium in Forced Tunnel Mode
Azure PowerShell
Deallocate the Standard Firewall
Azure PowerShell
$azfw = Get-AzFirewall -Name "<firewall-name>" -ResourceGroupName "
<resource-group-name>"
$azfw.Sku.Tier="Premium"
$vnet = Get-AzV... | [
-0.01935659907758236,
0.009446537122130394,
-0.007882141508162022,
0.03438140079379082,
0.05202493444085121,
0.02562566101551056,
0.04172058030962944,
-0.004938312340527773,
0.02344219759106636,
-0.016606755554676056,
-0.06449029594659805,
0.003695147577673197,
-0.06501910835504532,
-0.021... | {
"azure_component": "security",
"chunk_index": 572,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "545",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Allocate Firewall Premium
Azure PowerShell
You can attach a Premium policy to the new Premium Firewall using the Azure portal:
Learn more about Azure Firewall Premium features
$azfw = Get-AzFirewall -Name "<firewall-name>" -ResourceGroupName "
<resource-group-name>"
$azfw.Deallocate()
Set-AzFirewall -AzureFirewall $azf... | [
-0.007283839397132397,
0.017962485551834106,
0.03163572773337364,
0.021926293149590492,
0.05110911652445793,
0.03144994378089905,
0.025215348228812218,
-0.02932584099471569,
0.02359158731997013,
-0.03922314941883087,
-0.07646853476762772,
-0.006927999202162027,
-0.08209557086229324,
-0.013... | {
"azure_component": "security",
"chunk_index": 573,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "546",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Migrate Azure Firewall Standard to
Premium using Terraform
Article • 10/27/2023
Terraform
enables the definition, preview, and deployment of cloud infrastructure.
Using Terraform, you create configuration files using HCL syntax
. The HCL syntax
allows you to specify the cloud provider - such as Azure - and the element... | [
0.0071948436088860035,
0.006871172226965427,
-0.0032446763943880796,
0.025470033288002014,
0.09032279998064041,
0.01281039696186781,
0.03656642511487007,
0.02828134037554264,
0.007941904477775097,
-0.030334798619151115,
-0.0622992143034935,
-0.009951367974281311,
-0.048210274428129196,
0.0... | {
"azure_component": "security",
"chunk_index": 574,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "547",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Terraform
resource "random_pet" "prefix" {
prefix = var.prefix
length = 1
}
resource "azurerm_resource_group" "rg" {
name = "${random_pet.prefix.id}-rg"
location = var.resource_group_location
}
resource "azurerm_virtual_network" "vnet" {
name = "${random_pet.prefix.id}-vnet"
address_space... | [
0.0395263209939003,
-0.030200496315956116,
-0.010138633660972118,
0.01931520737707615,
0.06951375305652618,
0.011504669673740864,
0.0505182221531868,
0.022352125495672226,
-0.01416180282831192,
-0.07461332529783249,
-0.025221822783350945,
-0.02726495824754238,
-0.053373001515865326,
0.0303... | {
"azure_component": "security",
"chunk_index": 575,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "548",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. Create a file named variables.tf and insert the following code:
Terraform
rule {
name = "testrule"
source_addresses = [
"10.0.0.0/16",
]
target_fqdns = [
"*.google.com",
]
protocol {
port = "443"
type = "Https"
}
}
}
resource "azurerm_firewall_network_rule_col... | [
0.0413057841360569,
-0.008782046847045422,
-0.03356149420142174,
0.0293473731726408,
0.07522804290056229,
0.02630164474248886,
0.05562684312462807,
0.0222418624907732,
0.006441913079470396,
-0.06629226356744766,
-0.026499608531594276,
0.0005196213023737073,
-0.07302738726139069,
0.06329306... | {
"azure_component": "security",
"chunk_index": 576,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "549",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Run terraform init
to initialize the Terraform deployment. This command downloads
the Azure provider required to manage your Azure resources.
Console
Key points:
The -upgrade parameter upgrades the necessary provider plugins to the newest
version that complies with the configuration's version constraints.
Run terrafo... | [
0.017893942072987556,
-0.03078003227710724,
-0.023051269352436066,
-0.02816700004041195,
0.08865198493003845,
0.03993052616715431,
0.027350593358278275,
0.013175693340599537,
0.0012850576313212514,
-0.07659924030303955,
-0.05626308545470238,
0.008292900398373604,
-0.042924001812934875,
0.0... | {
"azure_component": "security",
"chunk_index": 577,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "550",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The optional -out parameter allows you to specify an output file for the plan.
Using the -out parameter ensures that the plan you reviewed is exactly what is
applied.
Run terraform apply
to apply the execution plan to your cloud infrastructure.
Console
Key points:
The example terraform apply command assumes you pre... | [
0.006223016884177923,
-0.013711117208003998,
-0.0015690597938373685,
-0.026765594258904457,
0.06076034530997276,
0.0401742197573185,
0.009544542990624905,
-0.011892477050423622,
0.007494157645851374,
-0.06608374416828156,
-0.05782861262559891,
0.0016921277856454253,
-0.056847695261240005,
... | {
"azure_component": "security",
"chunk_index": 578,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "551",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Open the main.tf file, and make the following changes:
1. Add the following 'data' section:
Terraform
2. Modify the firewall resource:
Terraform
3. Delete the classic rule collections:
Terraform
7. Edit the Terraform configuration file to
migrate the firewall
data "azurerm_firewall_policy" "prem-pol" {
name ... | [
0.0019194938940927386,
-0.0038586673326790333,
0.016290774568915367,
0.0029583568684756756,
0.10764652490615845,
-0.002717921743169427,
0.046581070870161057,
-0.003881043754518032,
-0.0051297456957399845,
-0.0618550144135952,
-0.0459931418299675,
0.02215873822569847,
-0.06696818023920059,
... | {
"azure_component": "security",
"chunk_index": 579,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "552",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. terraform plan -out main.tfplan
2. terraform apply main.tfplan
1. Select the test-resources resource group.
target_fqdns = [
"*.google.com",
]
protocol {
port = "443"
type = "Https"
}
}
}
resource "azurerm_firewall_network_rule_collection" "net-rc" {
name = "nette... | [
0.025843312963843346,
-0.022614959627389908,
0.0057928357273340225,
-0.014685153029859066,
0.10267452895641327,
0.005416003987193108,
0.022881722077727318,
0.030336396768689156,
0.00987220462411642,
-0.07684359699487686,
-0.016256581991910934,
0.014585690572857857,
-0.06176028400659561,
0.... | {
"azure_component": "security",
"chunk_index": 580,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "553",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
2. Select the testfirewall resource.
3. Verify the Firewall sku is Premium.
4. Verify the firewall is using the prem-pol firewall policy.
When you no longer need the resources created via Terraform, do the following steps:
1. Run terraform plan
and specify the destroy flag.
Console
Key points:
The terraform plan com... | [
0.02437310479581356,
0.0038157005328685045,
-0.0034863529726862907,
-0.0048830448649823666,
0.08069673925638199,
0.011834490112960339,
0.009120209142565727,
0.018323687836527824,
-0.018904054537415504,
-0.049703966826200485,
-0.05375207960605621,
0.03222817927598953,
-0.050179220736026764,
... | {
"azure_component": "security",
"chunk_index": 581,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "554",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Troubleshoot common problems when using Terraform on Azure
Troubleshoot Terraform on Azure
Next steps
Learn more about using Terraform in Azure
Yes
No | [
0.07458116859197617,
-0.011236892081797123,
-0.02037188597023487,
0.019354408606886864,
0.04999417066574097,
0.0262610986828804,
0.023186001926660538,
0.055929869413375854,
0.00794991385191679,
-0.05287995934486389,
0.0019945211242884398,
-0.019254526123404503,
-0.044916197657585144,
0.041... | {
"azure_component": "security",
"chunk_index": 582,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "555",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall easy upgrade/downgrade
Article • 04/11/2023
You can now easily upgrade your existing Firewall Standard SKU to Premium SKU and
downgrade from Premium to Standard SKU.
In the upgrade process, you can select the policy to be attached to the upgraded
Premium SKU. You can select an existing Premium Policy or ... | [
-0.005846122745424509,
-0.024213707074522972,
0.04630068317055702,
0.025656891986727715,
0.06310351938009262,
0.00290291802957654,
0.02968292124569416,
0.0005971043137833476,
0.027140026912093163,
-0.035244621336460114,
-0.029645882546901703,
-0.011624478735029697,
-0.06541474163532257,
0.... | {
"azure_component": "security",
"chunk_index": 583,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "556",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To learn more about Azure Firewall, see What is Azure Firewall?.
This new upgrade/downgrade capability doesn't currently support the Azure
Firewall Basic SKU.
Next steps | [
-0.0009394289227202535,
-0.04749765619635582,
0.05134269967675209,
0.001646870980039239,
0.05578495189547539,
-0.034177567809820175,
0.04817755147814751,
0.016434984281659126,
0.02823786251246929,
-0.034309279173612595,
0.024759748950600624,
0.01152235921472311,
-0.06262248754501343,
0.045... | {
"azure_component": "security",
"chunk_index": 584,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "557",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Monitor Azure Firewall
Article • 04/15/2025
This article describes:
The types of monitoring data you can collect for this service.
Ways to analyze that data.
When you have critical applications and business processes that rely on Azure resources, you
need to monitor and get alerts for your system. The Azure Monitor ser... | [
0.04234375059604645,
0.00917161162942648,
0.02845153398811817,
-0.02388891391456127,
0.07143229246139526,
0.0034939581528306007,
0.04227769747376442,
0.022778719663619995,
-0.0024009987246245146,
-0.061184145510196686,
-0.007339315488934517,
-0.005290625616908073,
-0.07287295907735825,
0.0... | {
"azure_component": "security",
"chunk_index": 585,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "558",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure uses the concept of resource types and IDs to identify everything in a subscription.
Resource types are also part of the resource IDs for every resource running in Azure. For
example, one resource type for a virtual machine is Microsoft.Compute/virtualMachines . For a
list of services and their associated resourc... | [
0.03444322571158409,
0.018465790897607803,
-0.00603907648473978,
0.011957275681197643,
0.0722668245434761,
0.024574439972639084,
0.029084235429763794,
-0.002220075111836195,
-0.034656185656785965,
-0.05694946274161339,
0.009245941415429115,
-0.02618209272623062,
-0.06943003088235855,
0.052... | {
"azure_component": "security",
"chunk_index": 586,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "559",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Routing: You can also route some platform metrics to Azure Monitor Logs / Log Analytics so
you can query them with other log data. Check the DS export setting for each metric to see if
you can use a diagnostic setting to route the metric to Azure Monitor Logs / Log Analytics.
For more information, see the Metrics diagn... | [
0.02927495911717415,
0.004574610386043787,
-0.008910585194826126,
-0.009669313207268715,
0.10069870203733444,
0.008371984586119652,
0.04187075048685074,
0.024446284398436546,
-0.007672479841858149,
-0.0866067036986351,
0.014135638251900673,
-0.0379427932202816,
-0.0591416135430336,
0.01591... | {
"azure_component": "security",
"chunk_index": 587,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "560",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
deployed across Azure, and combine them into unified interactive experiences.
You can also connect to your storage account and retrieve the JSON log entries for access and
performance logs. After you download the JSON files, you can convert them to CSV and view
them in Excel, Power BI, or any other data-visualization t... | [
0.022685576230287552,
-0.011773177422583103,
0.008759849704802036,
-0.021604085341095924,
0.09597256034612656,
-0.015042523853480816,
0.02893461473286152,
0.026002369821071625,
-0.026324491947889328,
-0.061813078820705414,
-0.005557395052164793,
-0.05472180247306824,
-0.07488074153661728,
... | {
"azure_component": "security",
"chunk_index": 588,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "561",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
This capability can help you track changes made to your firewall rules helping ensure
accountability for a sensitive resource like a firewall.
Structured logs are a type of log data that are organized in a specific format. They use a
predefined schema to structure log data in a way that makes it easy to search, filter,... | [
0.01529107429087162,
0.010922842659056187,
0.0026900917291641235,
-0.02581642009317875,
0.07380443811416626,
-0.02072206139564514,
0.027005067095160484,
-0.033440716564655304,
-0.021503612399101257,
-0.036534350365400314,
0.007731666788458824,
-0.0314396396279335,
-0.05813802033662796,
0.0... | {
"azure_component": "security",
"chunk_index": 589,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "562",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
settings need to be created per firewall.
In Resource specific mode, individual tables in the selected workspace are created for each
category selected in the diagnostic setting. This method is recommended since it:
might reduce overall logging costs by up to 80%.
makes it much easier to work with the data in log queri... | [
0.003277704818174243,
0.016723381355404854,
0.0075030201114714146,
0.008361902087926865,
0.07011903077363968,
-0.001873426022939384,
0.044436898082494736,
-0.010491319932043552,
-0.013281647115945816,
-0.05569902062416077,
-0.019159002229571342,
-0.02865838073194027,
-0.09377681463956833,
... | {
"azure_component": "security",
"chunk_index": 590,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "563",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
All resource specific tables now support the Basic table plan, which can reduce logging costs by
up to 80%. For more information on the limitations and differences of this new logging plan,
see Azure Monitor Logs. To learn about the new querying experience, see Query data in a basic
and auxiliary table.
To enable Azure... | [
-0.014664064161479473,
0.0369083471596241,
0.01060798391699791,
0.005316763184964657,
0.09958913177251816,
-0.02842378243803978,
0.055830568075180054,
-0.02110041305422783,
0.006455265451222658,
-0.02605743147432804,
-0.023051489144563675,
-0.005782374646514654,
-0.06783970445394516,
0.019... | {
"azure_component": "security",
"chunk_index": 591,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "564",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
A list of predefined queries is available in the Azure portal. This list has a predefined KQL (Kusto
Query Language) log query for each category and joined query showing the entire Azure
firewall logging events in single view.
Structured log queries | [
-0.03288307413458824,
-0.0009341067634522915,
0.009244571439921856,
-0.005693476181477308,
0.08898913115262985,
-0.0036488657351583242,
0.05478263273835182,
-0.01586128957569599,
-0.0160383190959692,
-0.007006962783634663,
-0.04927219823002815,
-0.03138680011034012,
-0.04646335169672966,
0... | {
"azure_component": "security",
"chunk_index": 592,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "565",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You can use
it to create rich visual reports within the Azure portal. You can tap into multiple firewalls
deployed across Azure and combine them into unified interactive experiences.
To deploy the new workbook that uses Azure Firewall ... | [
-0.014414282515645027,
0.02631465718150139,
0.004394855350255966,
-0.05608321353793144,
0.10255200415849686,
-0.006155717186629772,
0.017433781176805496,
-0.04056333005428314,
0.00814216397702694,
-0.06954627484083176,
-0.029934389516711235,
-0.017989790067076683,
-0.07456337660551071,
0.0... | {
"azure_component": "security",
"chunk_index": 593,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "566",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The Application rule log is saved to a storage account, streamed to Event hubs and/or sent to
Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that
matches one of your configured application rules results in a log for the accepted/denied
connection. The data is logged in JSON format... | [
-0.011831622570753098,
-0.01989530771970749,
0.036531828343868256,
-0.029493995010852814,
0.07002946734428406,
-0.03374996781349182,
0.07835040986537933,
0.004375486169010401,
-0.01799916662275791,
-0.046895768493413925,
-0.01142461970448494,
-0.03542579337954521,
-0.07721453160047531,
0.0... | {
"azure_component": "security",
"chunk_index": 594,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "567",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The Network rule log is saved to a storage account, streamed to Event hubs and/or sent to
Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that
matches one of your configured network rules results in a log for the accepted/denied
connection. The data is logged in JSON format, as sho... | [
-0.02903013676404953,
-0.031817469745874405,
0.011291907168924809,
-0.009045973420143127,
0.0807441845536232,
-0.013156428933143616,
0.0521378368139267,
0.02062295749783516,
-0.02193807251751423,
-0.05247312784194946,
0.007301675155758858,
-0.030495092272758484,
-0.07445608824491501,
0.047... | {
"azure_component": "security",
"chunk_index": 595,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "568",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
JSON
Failed:
JSON
Message format:
Console
There are many tools for analyzing monitoring data.
{
"category": "AzureFirewallDnsProxy",
"time": "2020-09-02T19:12:33.751Z",
"resourceId":
"/SUBSCRIPTIONS/{subscriptionId}/RESOURCEGROUPS/{resourceGroupName}/PROVIDERS/MICR
OSOFT.NETWORK/AZUREFIREWALLS/{resourceName}",
... | [
-0.0304583627730608,
-0.028934461995959282,
-0.020720243453979492,
0.0057952068746089935,
0.0371074452996254,
0.04094523936510086,
0.05977486073970795,
0.020892716944217682,
-0.012126743793487549,
-0.06771406531333923,
-0.007333387620747089,
-0.021573754027485847,
-0.07687415182590485,
0.0... | {
"azure_component": "security",
"chunk_index": 596,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "569",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Monitor supports the following basic tools:
Metrics explorer, a tool in the Azure portal that allows you to view and analyze metrics for
Azure resources. For more information, see Analyze metrics with Azure Monitor metrics
explorer.
Log Analytics, a tool in the Azure portal that allows you to query and analyze lo... | [
0.018081458285450935,
-0.009598519653081894,
0.010153384879231453,
-0.02777154929935932,
0.0920797660946846,
-0.025121381506323814,
0.0230480395257473,
0.020664799958467484,
-0.012195855379104614,
-0.06537563353776932,
0.008786383084952831,
-0.018953152000904083,
-0.0722770094871521,
0.032... | {
"azure_component": "security",
"chunk_index": 597,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "570",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can analyze monitoring data in the Azure Monitor Logs / Log Analytics store by using the
Kusto query language (KQL).
For a list of common queries for any service, see the Log Analytics queries interface.
Azure Monitor alerts proactively notify you when specific conditions are found in your
monitoring data. Alerts a... | [
0.027629993855953217,
-0.006665763445198536,
0.010304361581802368,
-0.02085035853087902,
0.08101833611726761,
-0.016151076182723045,
0.04408776015043259,
0.026248037815093994,
-0.010612403973937035,
-0.04152515158057213,
-0.020133379846811295,
-0.02704366110265255,
-0.08020209521055222,
0.... | {
"azure_component": "security",
"chunk_index": 598,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "571",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Log alerts allow users to use a Log Analytics query to evaluate resource logs at a
predefined frequency.
Activity log alerts trigger when a new activity log event occurs that matches defined
conditions. Resource Health alerts and Service Health alerts are activity log alerts that
report on your service and resource hea... | [
0.010449172928929329,
0.009033638052642345,
0.0070515843108296394,
-0.021106185391545296,
0.0797659158706665,
-0.015451588667929173,
0.04896341636776924,
0.007621327415108681,
-0.02764110639691353,
-0.060357026755809784,
-0.018932508304715157,
-0.012778800912201405,
-0.07177845388650894,
0... | {
"azure_component": "security",
"chunk_index": 599,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "572",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Browse to the workspace configured in the metrics diagnostics settings. Check if metrics are
available using the following query:
Kusto
Create alert to track receiving firewall metrics without any
failures
AzureMetrics
| where MetricName contains "FirewallHealth" | [
0.0010410512331873178,
0.007012412417680025,
0.007446145173162222,
-0.030037950724363327,
0.09807707369327545,
0.021768854930996895,
0.061670493334531784,
0.017584767192602158,
-0.01709645427763462,
-0.04815393313765526,
-0.046905435621738434,
0.006840270943939686,
-0.008063636720180511,
0... | {
"azure_component": "security",
"chunk_index": 600,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "573",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Next, create an alert for missing metrics over a time period of 60 minutes. To set up new alerts
on missing metrics, browse to the Alert page in the log analytics workspace.
You can set alerts for any metric, log entry, or activity log entry listed in the Azure Firewall
monitoring data reference.
| where ResourceId con... | [
0.029925936833024025,
0.0016830762615427375,
0.03652598336338997,
-0.008528662845492363,
0.07820186018943787,
-0.01023744698613882,
0.07038048654794693,
0.011297899298369884,
-0.03793017193675041,
-0.03995464742183685,
-0.02906891144812107,
0.009767062030732632,
-0.05617108941078186,
-0.01... | {
"azure_component": "security",
"chunk_index": 601,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "574",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For some services, if critical conditions or imminent changes occur during resource operations,
an alert displays on the service Overview page in the portal. You can find more information
and recommended fixes for the alert in Advisor recommendations under Monitoring in the
left menu. During normal operations, no advis... | [
0.016428900882601738,
-0.02564295008778572,
0.035972289741039276,
-0.04436945542693138,
0.07450244575738907,
-0.03679511323571205,
0.03255081921815872,
0.0561380609869957,
-0.032670531421899796,
-0.052014198154211044,
-0.04234059154987335,
0.0287109836935997,
-0.05868866294622421,
0.020645... | {
"azure_component": "security",
"chunk_index": 602,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "575",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Using Azure Firewall Workbooks
Article • 12/06/2023
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You
can use it to create rich visual reports within the Azure portal. You can tap into multiple
Firewalls deployed across Azure, and combine them into unified interactive experiences.... | [
0.024009360000491142,
0.04149983450770378,
0.016846798360347748,
-0.036599300801754,
0.09039758145809174,
-0.01336364634335041,
0.034966032952070236,
-0.023120064288377762,
0.011888397857546806,
-0.06414289772510529,
-0.05440161004662514,
-0.03632105141878128,
-0.06647549569606781,
0.03861... | {
"azure_component": "security",
"chunk_index": 603,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "576",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
4. Select the log analytics workspace and one or more firewall names you want to use
in this workbook as shown here:
The Azure Firewall workbook has seven tabs, each addressing distinct aspects of the
service. The following sections describe each tab.
The overview tab showcases graphs and statistics related to all type... | [
-0.023228701204061508,
0.036622557789087296,
-0.01639946922659874,
-0.019491717219352722,
0.08979778736829758,
0.01319441944360733,
0.06041044369339943,
-0.018118951469659805,
-0.006559367291629314,
-0.039876725524663925,
-0.048765894025564194,
-0.023853199556469917,
-0.073458731174469,
0.... | {
"azure_component": "security",
"chunk_index": 604,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "577",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Events, by time: Displays event frequency over time.
Events, by firewall over time: Shows event distribution across firewalls over time.
Events, by category: Categorizes and counts events.
Events categories, by time: Displays event categories over time.
Average throughput of firewall traffic: Shows average data passing... | [
-0.008812726475298405,
-0.01663762703537941,
0.0021599014289677143,
-0.0746951624751091,
0.04872490093111992,
-0.006743257865309715,
0.01600594073534012,
0.036304280161857605,
-0.04703299701213837,
-0.0168487299233675,
-0.025443261489272118,
-0.03341791406273842,
-0.047039300203323364,
0.0... | {
"azure_component": "security",
"chunk_index": 605,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "578",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The Network rules tab shows Layer 4 related events statistics correlated with your
specific network rules in Azure Firewall policy. The following widgets are available in the
Network rules tab:
Rule actions: Displays actions taken by rules.
Target ports: Shows targeted ports in network traffic.
DNAT actions: Displays a... | [
-0.009210330434143543,
-0.027669787406921387,
-0.0031406411435455084,
-0.05513893440365791,
0.05109725520014763,
-0.025060568004846573,
0.02288929931819439,
-0.007775257807224989,
0.02190347947180271,
-0.03609275072813034,
-0.014353319071233273,
-0.03584036976099014,
-0.06337885558605194,
... | {
"azure_component": "security",
"chunk_index": 606,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "579",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
This tab is relevant if you've set up Azure Firewall to function as a DNS proxy, serving as
an intermediary for DNS requests from client virtual machines to a DNS server. The DNS
Proxy tab includes various widgets that you can use:
DNS Proxy Traffic by count per Firewall: Displays DNS proxy traffic count for each
firew... | [
-0.01097665261477232,
-0.011338390409946442,
-0.009745366871356964,
-0.024714121595025063,
0.05370739847421646,
0.03220412880182266,
0.0385747067630291,
0.0014909106539562345,
-0.018232621252536774,
-0.05271408334374428,
-0.03502129763364792,
0.005954911932349205,
-0.049718718975782394,
0.... | {
"azure_component": "security",
"chunk_index": 607,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "580",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The IDPS log statistics tab offers a summary of malicious traffic events and the
preventive actions undertaken by the service. In the IDPS tab, you'll find various widgets
that you can use:
IDPS Actions Count: Counts IDPS actions.
IDPS Protocol Count: Counts protocols detected by IDPS.
IDPS SignatureID Count: Counts ID... | [
-0.025366472080349922,
-0.025185072794556618,
0.00657305121421814,
-0.01605970226228237,
0.059493277221918106,
0.009691602550446987,
0.051184456795454025,
-0.002677731215953827,
0.008484290912747383,
-0.055397748947143555,
-0.008874740451574326,
-0.03035726211965084,
-0.05144017934799194,
... | {
"azure_component": "security",
"chunk_index": 608,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "581",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Threat Intel Over Time: Displays Azure Firewall Threat Intelligence
detections over time.
Azure Firewall Threat Intel: Provides logs from Azure Firewall's Threat Intelligence.
The investigation section enables exploration and troubleshooting, offering additional
details such as the virtual machine name a... | [
-0.030052758753299713,
-0.009215709753334522,
-0.005702237598598003,
-0.015505376271903515,
0.07087162882089615,
0.023487737402319908,
0.04252170771360397,
0.01093092281371355,
-0.0028942434582859278,
-0.06078847870230675,
-0.016220631077885628,
-0.027164269238710403,
-0.04144573584198952,
... | {
"azure_component": "security",
"chunk_index": 609,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "582",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Learn more about Azure Firewall Diagnostics
Next steps | [
0.008548468351364136,
0.0072068022564053535,
0.027725012972950935,
0.02015233226120472,
0.059088192880153656,
0.003109469311311841,
0.070924773812294,
0.00442660553380847,
0.010129770264029503,
-0.0593307726085186,
0.03017061948776245,
-0.0014756486052647233,
-0.022818410769104958,
-0.0056... | {
"azure_component": "security",
"chunk_index": 610,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "583",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall threat intelligence-based
filtering
Article • 08/09/2023
You can enable Threat intelligence-based filtering for your firewall to alert and deny
traffic from/to known malicious IP addresses, FQDNs, and URLs. The IP addresses,
domains and URLs are sourced from the Microsoft Threat Intelligence feed, which
... | [
-0.015562277287244797,
-0.006096989847719669,
0.033780504018068314,
-0.02262568287551403,
0.07488976418972015,
-0.016551455482840538,
0.04022888094186783,
-0.016608906909823418,
-0.0037079935427755117,
-0.04208923503756523,
-0.03044765256345272,
-0.015484808944165707,
-0.07044460624456406,
... | {
"azure_component": "security",
"chunk_index": 611,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "584",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The following log excerpt shows a triggered rule:
JSON
Outbound testing - Outbound traffic alerts should be a rare occurrence, as it
means that your environment is compromised. To help test outbound alerts are
working, a test FQDN exists that triggers an alert. Use
testmaliciousdomain.eastus.cloudapp.azure.com for you... | [
-0.014494170434772968,
-0.030881892889738083,
0.032891761511564255,
0.004306004848331213,
0.058821141719818115,
-0.033775608986616135,
0.07339683175086975,
0.0147166196256876,
-0.014665549620985985,
-0.0470912903547287,
-0.011396467685699463,
0.016453098505735397,
-0.07576923817396164,
0.0... | {
"azure_component": "security",
"chunk_index": 612,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "585",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Ensure that the tested HTTP/S request is allowed using an application rule, not a
network rule.
Inbound testing - You can expect to see alerts on incoming traffic if the firewall
has DNAT rules configured. You'll see alerts even if the firewall only allows specific
sources on the DNAT rule and traffic is otherwise deni... | [
0.0021109282970428467,
-0.01235335785895586,
0.01967378333210945,
-0.01376441027969122,
0.05568542331457138,
-0.05407201498746872,
0.04625774547457695,
-0.019919758662581444,
0.011181550100445747,
-0.030993657186627388,
-0.024540327489376068,
0.009443660266697407,
-0.0805014818906784,
0.00... | {
"azure_component": "security",
"chunk_index": 613,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "586",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Best practices for Azure Firewall
performance
Article • 01/13/2025
To maximize the performance of your Azure Firewall and Firewall policy, it’s important to
follow best practices. However, certain network behaviors or features can affect the
firewall’s performance and latency, despite its performance optimization capab... | [
-0.02935427986085415,
-0.0029226569458842278,
0.006857883185148239,
-0.00394592946395278,
0.06237339973449707,
-0.024790549650788307,
0.04857763648033142,
0.0020775562152266502,
-0.006250256206840277,
-0.043780915439128876,
-0.018957672640681267,
-0.05078935623168945,
-0.05396449565887451,
... | {
"azure_component": "security",
"chunk_index": 614,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "587",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Ensure that you are within the following rule limitations.
Use or migrate to Azure Firewall Premium
Azure Firewall Premium uses advanced hardware and offers a higher-
performing underlying engine.
Best for heavier workloads and higher traffic volumes.
It also includes built-in accelerated networking software, which can... | [
-0.010934196412563324,
-0.03634163364768028,
0.006075715646147728,
0.0016855522990226746,
0.04261261224746704,
-0.013263942673802376,
0.07173590362071991,
0.008594810031354427,
-0.027287540957331657,
-0.05867113545536995,
-0.024635665118694305,
-0.018768806010484695,
-0.048758912831544876,
... | {
"azure_component": "security",
"chunk_index": 615,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "588",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Measure firewall latency using latency probe metrics
Use the latency probe metric to measure the average latency of the Azure
Firewall. This metric provides an indirect metric of the firewall’s performance.
Remember that intermittent ... | [
0.029997391626238823,
-0.03223872184753418,
0.007085567340254784,
-0.004736600909382105,
0.05902087315917015,
-0.00345264608040452,
0.027684686705470085,
0.02276570349931717,
-0.00374020473100245,
-0.059414781630039215,
0.000727986334823072,
-0.03797748312354088,
-0.0156460739672184,
0.003... | {
"azure_component": "security",
"chunk_index": 616,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "589",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Relocate Azure Firewall to another region
Article • 04/11/2025
This article shows you how to relocate an Azure Firewall that protects an Azure Virtual Network.
We highly recommend that you use Premium SKU. If you are on Standard SKU, consider
migrating from an existing Standard SKU Azure Firewall to Premium SKU before
... | [
-0.007016106508672237,
-0.015531928278505802,
0.03550179302692413,
0.030076701194047928,
0.07678753137588501,
0.013502031564712524,
0.03281105309724808,
-0.019581235945224762,
0.011635266244411469,
-0.030242865905165672,
-0.06892609596252441,
-0.041284896433353424,
-0.043920569121837616,
0... | {
"azure_component": "security",
"chunk_index": 617,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "590",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. Sign in to the Azure portal
.
2. Select All resources and then select your Azure Firewall resource.
3. On the Azure Firewall page, select Export template under Automation in the left
menu.
4. Choose Download in the Export template page.
5. Locate the .zip file that you downloaded from the portal, and unzip that file... | [
-0.002288504270836711,
0.016992291435599327,
-0.006231109146028757,
0.00788436271250248,
0.08358030021190643,
-0.0001716829719953239,
0.019242404028773308,
0.0002846703864634037,
0.007586848456412554,
-0.04541601613163948,
-0.05527835711836815,
-0.04848446696996689,
-0.04044722393155098,
0... | {
"azure_component": "security",
"chunk_index": 618,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "591",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
6. Select Build your own template in the editor.
7. Select Load file, and then follow the instructions to load the template.json file that
you downloaded in the previous section
8. In the template.json file, replace:
firewallName with the default value of your Azure Firewall name.
azureFirewallPublicIpId with the I... | [
0.021415913477540016,
0.014851638115942478,
-0.012029395438730717,
0.010584641247987747,
0.07204748690128326,
0.02346310205757618,
0.05111946538090706,
0.012224366888403893,
0.01023948285728693,
-0.0752413272857666,
-0.033102311193943024,
-0.029080573469400406,
-0.06215789541602135,
0.0255... | {
"azure_component": "security",
"chunk_index": 619,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "592",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Diagnostic Settings. When recreating the Azure Firewall in the target region, be
sure to review the Diagnostic Setting and configure it to reflect the target region
(Log Analytics workspace, storage account, event hubs, or 3rd-party partner
solution).
12. Edit the location property in the template.json file to the ta... | [
0.019873641431331635,
-0.0058815572410821915,
0.020744463428854942,
0.004883966874331236,
0.0937727764248848,
0.032959286123514175,
0.03796079009771347,
0.025375772267580032,
0.02094097062945366,
-0.07063660025596619,
-0.017744820564985275,
-0.06617416441440582,
-0.05501491203904152,
0.006... | {
"azure_component": "security",
"chunk_index": 620,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "593",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Move resources to a new resource group or subscription
Move Azure VMs to another region | [
-0.00019538431661203504,
-0.027190862223505974,
0.04577425494790077,
0.04350678622722626,
0.07250098884105682,
0.02086443267762661,
0.040639977902173996,
-0.004644065164029598,
-0.013083664700388908,
-0.05240848660469055,
-0.057183124125003815,
0.009653657674789429,
-0.06065046042203903,
0... | {
"azure_component": "security",
"chunk_index": 621,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "594",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall remote work support
Article • 03/24/2022
Azure Firewall is a managed, cloud-based network security service that protects your
Azure virtual network resources. It's a fully stateful firewall as a service with built-in high
availability and unrestricted cloud scalability.
Work from home policies requires m... | [
0.04486460238695145,
0.010601740330457687,
0.042026106268167496,
0.021550273522734642,
0.06153503432869911,
-0.0004248494515195489,
0.06270189583301544,
-0.015146494843065739,
0.007549431640654802,
-0.033975791186094284,
-0.048417482525110245,
-0.018694352358579636,
-0.04711746424436569,
0... | {
"azure_component": "security",
"chunk_index": 622,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "595",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall known issues and limitations
Article • 04/14/2025
This article lists the known issues for Azure Firewall and is updated as they're resolved.
For Azure Firewall limitations, see Azure subscription and service limits, quotas, and constraints.
Azure Firewall Standard has the following known issues:
Issue
De... | [
0.01175488531589508,
-0.024037502706050873,
-0.020435143262147903,
-0.0010924579109996557,
0.06670772284269333,
-0.0030144506599754095,
0.06334678828716278,
0.0008184554171748459,
0.02240607887506485,
-0.031159674748778343,
-0.047274377197027206,
-0.047596275806427,
-0.07180768251419067,
0... | {
"azure_component": "security",
"chunk_index": 623,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "596",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Issue
Description
Mitigation
limited to the Standard and
Premium Firewall versions.
Network filtering rules for
non-TCP/UDP protocols
(for example ICMP) don't
work for Internet bound
traffic
Network filtering rules for non-
TCP/UDP protocols don't work with
SNAT to your public IP address.
Non-TCP/UDP protocols are
supp... | [
-0.024114979431033134,
-0.013658195734024048,
-0.01274569146335125,
0.004703359678387642,
0.05674733221530914,
-0.014980140142142773,
0.03866187110543251,
0.009552755393087864,
0.01839488372206688,
-0.058427274227142334,
-0.002350150141865015,
-0.011370720341801643,
-0.07708755135536194,
0... | {
"azure_component": "security",
"chunk_index": 624,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "597",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
and CLI
support for ICMP
Azure PowerShell and CLI don't
support ICMP as a valid protocol in
network rules.
It's still possible to use ICMP as a
protocol via the portal and the REST
API. We're working to add ICMP in
PowerShell and CLI soon.
FQDN tags require a
protocol: port to be set
Application rules with FQDN tags
re... | [
-0.018083956092596054,
-0.027379192411899567,
-0.006366036366671324,
-0.010068275034427643,
0.07047130167484283,
-0.07012772560119629,
0.03429168462753296,
0.018086059018969536,
0.006423206068575382,
-0.034353870898485184,
-0.02667541429400444,
0.030215464532375336,
-0.09162747859954834,
0... | {
"azure_component": "security",
"chunk_index": 625,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "597",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Issue
Description
Mitigation
when configured to alert only
mode.
With secured virtual hubs,
availability zones can only
be configured during
deployment.
You can't configure Availability
Zones after a firewall with secured
virtual hubs is deployed.
This is by design.
SNAT on inbound
connections
Inbound DNAT rules always... | [
0.012136389501392841,
-0.013104218989610672,
0.02381161041557789,
0.017220493406057358,
0.05975920334458351,
-0.035412196069955826,
0.03554164618253708,
0.013953001238405704,
-0.017043722793459892,
-0.04982396587729454,
-0.055445604026317596,
-0.03998807817697525,
-0.09377501904964447,
0.0... | {
"azure_component": "security",
"chunk_index": 626,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "598",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Issue
Description
Mitigation
guaranteed. For private IP addresses
like virtual networks, VPNs, and Azure
ExpressRoute, Azure Firewall supports
an outbound connection on TCP port
25.
SNAT port exhaustion
Azure Firewall currently supports
2,496 ports per Public IP address
per backend Virtual Machine Scale
Set instance. B... | [
0.0004627334710676223,
-0.06754062324762344,
-0.004931905306875706,
0.008112908340990543,
0.019989004358649254,
0.010566920042037964,
0.05274420976638794,
0.022071095183491707,
-0.012360590510070324,
-0.03963295370340347,
-0.00020012409368064255,
-0.02921287901699543,
-0.06828899681568146,
... | {
"azure_component": "security",
"chunk_index": 627,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "599",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
for
the source IP address. FTP might
fail when data and control channels
use different source IP addresses,
depending on your FTP server
configuration.
An explicit SNAT configuration is
planned. In the meantime, you can
configure your FTP server to accept
data and control channels from
different source IP addresses (se... | [
0.0024030697531998158,
-0.038521941751241684,
-0.019748549908399582,
0.052063632756471634,
0.06461715698242188,
-0.0072098951786756516,
0.030425675213336945,
0.00515918480232358,
0.02172839641571045,
-0.05388404801487923,
0.0023783037904649973,
-0.024635300040245056,
-0.06835593283176422,
... | {
"azure_component": "security",
"chunk_index": 628,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "599",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Issue
Description
Mitigation
to ensure symmetric routing. FTP
might fail when data and control
channels use different source IP
addresses, depending on your FTP
server configuration.
channels from different source IP
addresses.
Active FTP doesn't work
when the FTP client must
reach an FTP server across
the internet.
Ac... | [
-0.0011322314385324717,
-0.05241436883807182,
-0.016329897567629814,
0.010297047905623913,
0.03651592135429382,
-0.02667893096804619,
0.029848139733076096,
0.019615162163972855,
-0.0027464907616376877,
-0.07142449170351028,
-0.012439530342817307,
-0.04609125852584839,
-0.08510274440050125,
... | {
"azure_component": "security",
"chunk_index": 629,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "600",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
connection using a
network rule instead of an
application rule. See Server Name
Indication
for software that
supports SNI.
Can't add firewall policy
tags using the portal or
Azure Resource Manager
(ARM) templates
Azure Firewall Policy has a patch
support limitation that prevents
you from adding a tag using the
Azure p... | [
0.0010185131104663014,
-0.032686829566955566,
-0.016116295009851456,
-0.004108034539967775,
0.06103375554084778,
-0.0358961820602417,
0.03911293298006058,
-0.03290128335356712,
-0.024797651916742325,
-0.025892317295074463,
-0.03616788983345032,
-0.023073043674230576,
-0.06503253430128098,
... | {
"azure_component": "security",
"chunk_index": 630,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "600",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Issue
Description
Mitigation
Couldn't save the tags for the
resource.
IPv6 not currently
supported
If you add an IPv6 address to a
rule, the firewall fails.
Use only IPv4 addresses. IPv6 support
is under investigation.
Removing
RuleCollectionGroups
using ARM templates not
supported.
Removing a RuleCollectionGroup
using... | [
0.014320828020572662,
-0.03016524575650692,
0.01787259429693222,
0.014370198361575603,
0.02892911806702614,
-0.033585742115974426,
0.029887599870562553,
-0.026580533012747765,
0.00395199516788125,
-0.04614895209670067,
-0.022870469838380814,
-0.02721903659403324,
-0.07462366670370102,
0.05... | {
"azure_component": "security",
"chunk_index": 631,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "601",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Issue
Description
Mitigation
ESNI support for FQDN
resolution in HTTPS
Encrypted SNI isn't supported in HTTPS
handshake.
Today only Firefox supports
ESNI through custom
configuration. Suggested
workaround is to disable
this feature.
Client Certification
Authentication isn't
supported
Client certificates are used to bui... | [
0.004020594526082277,
-0.03249133378267288,
0.002958910306915641,
0.014467098750174046,
0.05042048543691635,
-0.003949138801544905,
0.032844629138708115,
0.03514154255390167,
-0.0032086584251374006,
-0.05186999589204788,
-0.01817336305975914,
-0.00975236389786005,
-0.07709282636642456,
0.0... | {
"azure_component": "security",
"chunk_index": 632,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "602",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Premium features
Learn more about Azure network security | [
0.007929520681500435,
-0.0008637083228677511,
0.04209059849381447,
0.06114821881055832,
0.062067970633506775,
0.01051719207316637,
0.06382057815790176,
-0.008587866090238094,
0.016170630231499672,
-0.039977844804525375,
-0.02048533223569393,
-0.010274653322994709,
-0.02592715434730053,
0.0... | {
"azure_component": "security",
"chunk_index": 633,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "603",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
az network firewall
Manage and configure Azure Firewalls.
Name
Description
Type
Status
az network firewall application-
rule
Manage and configure Azure Firewall
application rules.
Extension
GA
az network firewall application-
rule collection
Manage and configure Azure Firewall
application rule collections.
Extension
GA... | [
-0.020086925476789474,
0.016176695004105568,
-0.018967851996421814,
-0.011092442087829113,
0.041014429181814194,
-0.034483518451452255,
0.03720561042428017,
0.01969228871166706,
0.004419190809130669,
-0.0309611763805151,
-0.0882883220911026,
0.0330558605492115,
-0.05978740006685257,
0.0371... | {
"azure_component": "security",
"chunk_index": 634,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "604",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Type
Status
az network firewall ip-config
Manage and configure Azure Firewall IP
configurations.
Extension
GA
az network firewall ip-config
create
Create an Azure Firewall IP configuration.
Extension
GA
az network firewall ip-config
delete
Delete an Azure Firewall IP configuration.
Extension
GA
az netw... | [
-0.02705695666372776,
-0.0014215477276593447,
-0.031954143196344376,
0.011246314272284508,
0.06168544664978981,
-0.0037844586186110973,
0.05302111431956291,
0.02323446236550808,
0.004736111033707857,
-0.03717132657766342,
-0.05913418531417847,
0.0066427490673959255,
-0.0814991369843483,
0.... | {
"azure_component": "security",
"chunk_index": 635,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "605",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Type
Status
az network firewall nat-rule list
List Azure Firewall NAT rules.
Extension
GA
az network firewall nat-rule show
Get the details of an Azure Firewall NAT rule.
Extension
GA
az network firewall network-rule
Manage and configure Azure Firewall network
rules.
Extension
GA
az network firewall ne... | [
-0.030863823369145393,
-0.02220536395907402,
-0.01823071949183941,
0.004675190430134535,
0.041862137615680695,
-0.024524929001927376,
0.056062713265419006,
0.015728311613202095,
-0.0072107138112187386,
-0.04130585119128227,
-0.06192365661263466,
0.01694292016327381,
-0.06622622907161713,
0... | {
"azure_component": "security",
"chunk_index": 636,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "606",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Type
Status
az network firewall policy draft
intrusion-detection
Manage intrusion signature rules and bypass
rules.
Extension
GA
az network firewall policy draft
intrusion-detection add
Update a draft Firewall Policy.
Extension
Preview
az network firewall policy draft
intrusion-detection list
List all ... | [
-0.0185416080057621,
-0.029747284948825836,
0.00971361342817545,
-0.0037130892742425203,
0.06566356122493744,
-0.007525658700615168,
0.03919572755694389,
0.012066381052136421,
-0.03965574875473976,
-0.06936611980199814,
-0.03792446479201317,
-0.006292400415986776,
-0.0627361312508583,
0.01... | {
"azure_component": "security",
"chunk_index": 637,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "607",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Type
Status
az network firewall policy rule-
collection-group collection add-
nat-collection
Add a NAT collection into an Azure firewall
policy rule collection group.
Extension
Preview
az network firewall policy rule-
collection-group collection list
List all rule collections of an Azure firewall
polic... | [
-0.006914925761520863,
-0.02127693220973015,
-0.010944814421236515,
-0.00454391585662961,
0.039673980325460434,
-0.02832147106528282,
0.04166245460510254,
-0.012293812818825245,
-0.020160632207989693,
-0.05205344408750534,
-0.05618869513273239,
0.0014145663008093834,
-0.078739233314991,
0.... | {
"azure_component": "security",
"chunk_index": 638,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "608",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Type
Status
az network firewall policy rule-
collection-group draft collection
list
List all rule collections of an Azure firewall
policy rule collection group draft.
Extension
Preview
az network firewall policy rule-
collection-group draft collection
remove
Remove a rule collection from an Azure
firew... | [
-0.003444477915763855,
-0.01872742362320423,
-0.010444472543895245,
-0.01258386205881834,
0.05585673078894615,
-0.018181942403316498,
0.024589937180280685,
0.008659842424094677,
-0.03937637433409691,
-0.06884255260229111,
-0.05313405767083168,
-0.008206907659769058,
-0.06770790368318558,
0... | {
"azure_component": "security",
"chunk_index": 639,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "609",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Description
Type
Status
az network firewall policy update
Update an Azure firewall policy.
Extension
GA
az network firewall policy wait
Place the CLI in a waiting state until a
condition is met.
Extension
GA
az network firewall show
Get the details of an Azure Firewall.
Extension
GA
az network firewall threat-inte... | [
-0.02812659740447998,
-0.03110527992248535,
-0.031915176659822464,
0.022733980789780617,
0.0764908641576767,
0.013569870963692665,
0.026180081069469452,
0.010091661475598812,
-0.01541049126535654,
-0.056607749313116074,
-0.06125076115131378,
0.014702375046908855,
-0.07884291559457779,
0.02... | {
"azure_component": "security",
"chunk_index": 640,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "610",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Create a Azure firewall with private ranges
Azure CLI
Create a Virtual WAN Secure Hub Firewall
Azure CLI
Create a Basic SKU Firewall with Management IP Configuration
Azure CLI
false, n, no, t, true, y, yes}]
[--enable-pac-file {0, 1, f, false, n, no, t, true, y,
yes}]
... | [
0.028723377734422684,
0.014713715761899948,
-0.00922753568738699,
0.04483210667967796,
0.04868489131331444,
-0.003718332387506962,
0.06330594420433044,
0.010521001182496548,
0.014742875471711159,
-0.035319890826940536,
-0.03306131064891815,
0.005672526080161333,
-0.070501409471035,
0.04310... | {
"azure_component": "security",
"chunk_index": 641,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "611",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Create a Basic SKU Firewall with Virtual Hub
Azure CLI
--name -n
Azure Firewall name.
--resource-group -g
Name of resource group. You can configure the default group using az configure --
defaults group=<name> .
The following parameters are optional, but depending on the context, one or more might
become required for t... | [
-0.009050837717950344,
-0.0007353686378337443,
0.029347442090511322,
0.015662452206015587,
0.03600011765956879,
-0.01839207299053669,
0.04280105605721474,
0.04549437388777733,
0.011100342497229576,
-0.03292502090334892,
-0.07618255168199539,
-0.019061429426074028,
-0.10001245141029358,
0.0... | {
"azure_component": "security",
"chunk_index": 642,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "612",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Property
Value
Parameter group:
Data Traffic IP Configuration Arguments
--count --public-ip-count
Number of Public IP Address associated with azure firewall. It's used to add public ip
addresses into this firewall.
Property
Value
Parameter group:
Virtual Hub Public Ip Arguments
--dns-servers
Space-separated list of DNS... | [
-0.029813410714268684,
-0.003056868212297559,
0.015768717974424362,
-0.020282095298171043,
0.008010809309780598,
0.05188434571027756,
0.05399584770202637,
-0.021390868350863457,
-0.0057440465316176414,
-0.055110134184360504,
-0.05145251750946045,
-0.0243405532091856,
-0.08937167376279831,
... | {
"azure_component": "security",
"chunk_index": 643,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "613",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
When set to true, explicit proxy mode is enabled.
Property
Value
Parameter group:
Explicit Proxy Arguments
Accepted values:
0, 1, f, false, n, no, t, true, y, yes
--enable-fat-flow-logging --fat-flow-logging
Allow fat flow logging. By default it is false.
Property
Value
Accepted values:
0, 1, f, false, n, no, t, true, ... | [
-0.017970426008105278,
-0.024157637730240822,
0.01262118574231863,
0.0108379190787673,
0.0654388889670372,
0.006095085293054581,
0.05428889021277428,
-0.015024685300886631,
0.017056124284863472,
-0.06861263513565063,
-0.02712610550224781,
-0.00523368502035737,
-0.059889622032642365,
0.0451... | {
"azure_component": "security",
"chunk_index": 644,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "614",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
--http-port
Port number for explicit proxy http protocol, cannot be greater than 64000.
Property
Value
Parameter group:
Explicit Proxy Arguments
--https-port
Port number for explicit proxy https protocol, cannot be greater than 64000.
Property
Value
Parameter group:
Explicit Proxy Arguments
Accepted values:
0, 1, f, fa... | [
-0.02242552489042282,
0.013816026970744133,
0.003633213695138693,
-0.013551615178585052,
0.03582637757062912,
0.006720882840454578,
0.04593033716082573,
-0.025163689628243446,
0.007831051014363766,
-0.06895002722740173,
-0.018089428544044495,
0.0031715799123048782,
-0.09968969225883484,
0.... | {
"azure_component": "security",
"chunk_index": 645,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "615",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Property
Value
Parameter group:
Management IP Configuration Arguments
--no-wait
Do not wait for the long-running operation to finish.
Property
Value
Accepted values:
0, 1, f, false, n, no, t, true, y, yes
--pac-file
SAS URL for PAC file.
Property
Value
Parameter group:
Explicit Proxy Arguments
--pac-file-port
Port numb... | [
-0.018454665318131447,
0.01109636202454567,
-0.0006778298993594944,
0.027113638818264008,
0.024168044328689575,
0.019008850678801537,
0.060343001037836075,
-0.017943350598216057,
-0.005162905436009169,
-0.07319562882184982,
-0.034997157752513885,
-0.015378343872725964,
-0.054966963827610016,... | {
"azure_component": "security",
"chunk_index": 646,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "616",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Property
Value
Parameter group:
Data Traffic IP Configuration Arguments
--route-server-id
The Route Server Id for the firewall.
--sku
SKU of Azure firewall. This field cannot be updated after the creation. The default sku in
server end is AZFW_VNet. If you want to attach azure firewall to vhub, you should set
sku to AZ... | [
0.018428875133395195,
-0.014995064586400986,
0.005216206423938274,
0.03243539482355118,
0.0384858064353466,
0.002394246170297265,
0.056093983352184296,
0.04450253024697304,
0.027415256947278976,
-0.05766339227557182,
-0.034739505499601364,
-0.03676214441657066,
-0.09716018289327621,
0.0371... | {
"azure_component": "security",
"chunk_index": 647,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "617",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Property
Value
Default value:
Standard
Accepted values:
Basic, Premium, Standard
--vhub --virtual-hub
Name or ID of the virtualHub to which the firewall belongs.
--vnet-name
The virtual network (VNet) name. It should contain one subnet called
"AzureFirewallSubnet".
Property
Value
Parameter group:
Data Traffic IP Config... | [
0.008359176106750965,
-0.0053535280749201775,
0.050682585686445236,
0.01618088223040104,
0.05605321377515793,
0.0138307586312294,
0.07549549639225006,
0.0013012370327487588,
0.012488611973822117,
-0.058724697679281235,
-0.04885222017765045,
-0.020577657967805862,
-0.09356387704610825,
0.00... | {
"azure_component": "security",
"chunk_index": 648,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "618",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Only show errors, suppressing warnings.
Property
Value
Default value:
False
--output -o
Output format.
Property
Value
Default value:
json
Accepted values:
json, jsonc, none, table, tsv, yaml, yamlc
--query
JMESPath query string. See http://jmespath.org/
for more information and examples.
--subscription
Name or ID of s... | [
-0.018357830122113228,
0.012156394310295582,
0.0012167413951829076,
0.001995349768549204,
0.07585234940052032,
0.011612731963396072,
0.08030777424573898,
0.0288982130587101,
-0.00017965014558285475,
-0.05413651838898659,
-0.04142908379435539,
0.02612885646522045,
-0.10228683054447174,
0.03... | {
"azure_component": "security",
"chunk_index": 649,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "619",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure CLI
The following parameters are optional, but depending on the context, one or more might
become required for the command to execute successfully.
--ids
One or more resource IDs (space-delimited). It should be a complete resource ID
containing all information of 'Resource Id' arguments. You should provide either... | [
-0.03163762390613556,
0.018461396917700768,
-0.014904827810823917,
0.018427133560180664,
0.05842001363635063,
0.04067734628915787,
0.040316492319107056,
-0.011922395788133144,
0.005570709239691496,
-0.06139654666185379,
-0.04776393994688988,
0.02882854826748371,
-0.072331503033638,
0.03570... | {
"azure_component": "security",
"chunk_index": 650,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "620",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
--resource-group -g
Name of resource group. You can configure the default group using az configure --
defaults group=<name> .
Property
Value
Parameter group:
Resource Id Arguments
--subscription
Name or ID of subscription. You can configure the default subscription using az account
set -s NAME_OR_ID .
Property
Value
Pa... | [
-0.02523292787373066,
0.02350686490535736,
0.035212140530347824,
0.0031495639123022556,
0.031975094228982925,
0.018786966800689697,
0.06133833900094032,
-0.003281546290963888,
-0.00009719474473968148,
-0.05800534784793854,
-0.05027490109205246,
0.011292721144855022,
-0.07848497480154037,
0... | {
"azure_component": "security",
"chunk_index": 651,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "621",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Property
Value
Default value:
False
--output -o
Output format.
Property
Value
Default value:
json
Accepted values:
json, jsonc, none, table, tsv, yaml, yamlc
--query
JMESPath query string. See http://jmespath.org/
for more information and examples.
--verbose
Increase logging verbosity. Use --debug for full debug logs.... | [
-0.023062653839588165,
-0.0032637757249176502,
0.0022660144604742527,
0.020320888608694077,
0.07092339545488358,
0.0005898675881326199,
0.06449605524539948,
0.05049636587500572,
-0.013288941234350204,
-0.07121825963258743,
-0.038668710738420486,
0.020350635051727295,
-0.0884377583861351,
0... | {
"azure_component": "security",
"chunk_index": 652,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "622",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
List Learned IP Prefixes
Azure CLI
The following parameters are optional, but depending on the context, one or more might
become required for the command to execute successfully.
--ids
One or more resource IDs (space-delimited). It should be a complete resource ID
containing all information of 'Resource Id' arguments. ... | [
-0.020308012142777443,
0.012590086087584496,
-0.032162174582481384,
0.03010491281747818,
0.05718335509300232,
0.0445098951458931,
0.04387551546096802,
-0.006494863424450159,
-0.007407728116959333,
-0.04615641012787819,
-0.025919971987605095,
0.026232818141579628,
-0.06311049312353134,
0.00... | {
"azure_component": "security",
"chunk_index": 653,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "623",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
--no-wait
Do not wait for the long-running operation to finish.
Property
Value
Accepted values:
0, 1, f, false, n, no, t, true, y, yes
--resource-group -g
Name of resource group. You can configure the default group using az configure --
defaults group=<name> .
Property
Value
Parameter group:
Resource Id Arguments
--sub... | [
-0.025993922725319862,
-0.0020695305429399014,
0.01773737370967865,
0.00932998489588499,
0.05089365318417549,
0.025049706920981407,
0.05076313763856888,
0.023354677483439445,
-0.015560370869934559,
-0.06919162720441818,
-0.04865485057234764,
0.017590686678886414,
-0.06241690367460251,
0.02... | {
"azure_component": "security",
"chunk_index": 654,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "624",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
--help -h
Show this help message and exit.
--only-show-errors
Only show errors, suppressing warnings.
Property
Value
Default value:
False
--output -o
Output format.
Property
Value
Default value:
json
Accepted values:
json, jsonc, none, table, tsv, yaml, yamlc
--query
JMESPath query string. See http://jmespath.org/
for... | [
-0.01408267393708229,
0.027972588315606117,
-0.002838917076587677,
0.006797960493713617,
0.04471370205283165,
-0.01940050721168518,
0.07494919747114182,
0.022502364590764046,
-0.027247551828622818,
-0.07024866342544556,
-0.054983120411634445,
0.019167641177773476,
-0.09833177179098129,
0.0... | {
"azure_component": "security",
"chunk_index": 655,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "625",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
List Azure Firewalls.
Azure CLI
The following parameters are optional, but depending on the context, one or more might
become required for the command to execute successfully.
--max-items
Total number of items to return in the command's output. If the total number of items
available is more than the value specified, a ... | [
-0.04699241742491722,
-0.02667419984936714,
-0.027362527325749397,
0.02396082878112793,
0.03871394321322441,
0.017820430919528008,
0.033174920827150345,
0.02388347126543522,
-0.017058568075299263,
-0.06095520406961441,
-0.08141820877790451,
-0.014757335186004639,
-0.051608581095933914,
0.0... | {
"azure_component": "security",
"chunk_index": 656,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "626",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
--debug
Increase logging verbosity to show all debug logs.
Property
Value
Default value:
False
--help -h
Show this help message and exit.
--only-show-errors
Only show errors, suppressing warnings.
Property
Value
Default value:
False
--output -o
Output format.
Property
Value
Default value:
json
Accepted values:
json, js... | [
-0.012674662284553051,
0.013538607396185398,
-0.007749040611088276,
0.01207064464688301,
0.054564666002988815,
0.003805051324889064,
0.08984516561031342,
0.009528996422886848,
-0.032559141516685486,
-0.08245861530303955,
-0.023623576387763023,
0.004634476266801357,
-0.11277681589126587,
0.... | {
"azure_component": "security",
"chunk_index": 657,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "627",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name or ID of subscription. You can configure the default subscription using az account
set -s NAME_OR_ID .
--verbose
Increase logging verbosity. Use --debug for full debug logs.
Property
Value
Default value:
False
Gets all the Azure Firewall FQDN Tags in a subscription.
Azure CLI
The following parameters are optional,... | [
-0.04133711755275726,
-0.024644196033477783,
-0.0026812199503183365,
0.012677345424890518,
0.06352333724498749,
0.01639997959136963,
0.04381786659359932,
0.02385868690907955,
0.013168536126613617,
-0.03979530930519104,
-0.07462924718856812,
0.015305493026971817,
-0.08539841324090958,
0.011... | {
"azure_component": "security",
"chunk_index": 658,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "628",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.