text
stringlengths
0
3.99k
embedding
listlengths
768
768
metadata
dict
Hunting query What does it do? What does it indicate? First time source IP connects to a destination Helps to identify an IOA when malicious communication is done for the first time from machines that never accessed the destination before. Based on learning the regular traffic during a specified period. Source IP abnor...
[ -0.04366971179842949, -0.04069862142205238, -0.02389516495168209, -0.02342492900788784, 0.05872850865125656, -0.038684748113155365, 0.019957609474658966, 0.03124576434493065, -0.01231657899916172, -0.04492225497961044, 0.0017237792490050197, -0.043762754648923874, -0.08722274750471115, 0.0...
{ "azure_component": "security", "chunk_index": 559, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "533", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
A sales representative in the company has accidentally opened a phishing email and opened a PDF file containing malware. The malware immediately tries to connect to a malicious website but Azure Firewall blocks it. The firewall detected the domain using the Microsoft threat intelligence feed it consumes. The connection...
[ -0.008059858344495296, -0.03736472874879837, -0.02771034650504589, 0.030290227383375168, 0.08411277085542679, -0.01956801488995552, 0.05026676133275032, -0.011496469378471375, 0.02105339989066124, -0.05600768327713013, -0.0013085086829960346, 0.002892941003665328, -0.06479738652706146, 0.0...
{ "azure_component": "security", "chunk_index": 560, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "534", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Detect malware with Microsoft Sentinel for Azure Firewall Article • 01/23/2024 Malware is any software that is designed to cause damage, disruption, or compromise the security and functionality of computer systems, networks, or devices. It includes diverse types of threats, such as viruses, worms, trojans, ransomware, ...
[ 0.008273771032691002, -0.03475996479392052, 0.01927986368536949, 0.005462556146085262, 0.0633852407336235, -0.0019209147430956364, 0.051779843866825104, -0.0016861128387972713, 0.019546670839190483, -0.07065296173095703, -0.010231542401015759, -0.009893754497170448, -0.044158924371004105, ...
{ "azure_component": "security", "chunk_index": 561, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "535", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Due to the recent surge in cryptocurrency mining, there's an increasing need for high- performance network processing units. Distributed computing is expanding and the widespread availability of mining software, both in legal and illegal contexts. Coinminer represents a type of malware that uses the hardware resources...
[ 0.025829052552580833, -0.008732210844755173, -0.041910320520401, 0.011191774159669876, 0.04834699630737305, 0.0014048543525859714, 0.01670835167169571, 0.024430016055703163, 0.01535481121391058, -0.03675936162471771, 0.00861268863081932, 0.011696591973304749, -0.059594884514808655, 0.05428...
{ "azure_component": "security", "chunk_index": 562, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "536", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
= column_ifexists("transactionId_g", "") | where DestinationPort in (coinminerPorts) // Filter traffic on known coinminer ports | summarize CoinminerAttempts = count() by DestinationHost, DestinationPort | where CoinminerAttempts > 10 // Adjust threshold as needed ), (AZFWIdpsSignature | where DestinationPo...
[ 0.008084705099463463, 0.00869721919298172, 0.02948756515979767, -0.027510497719049454, 0.10635312646627426, -0.0000960846955422312, 0.021155312657356262, -0.012695703655481339, -0.003262526821345091, -0.029236776754260063, 0.017849385738372803, 0.025016602128744125, -0.08260149508714676, 0...
{ "azure_component": "security", "chunk_index": 563, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "536", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
(AzureDiagnostics | where ResourceType == "AZUREFIREWALLS" | where Category == "AzureFirewallDnsProxy" | parse msg_s with "DNS Request: " ClientIP ":" ClientPort " - " QueryID " " Request_Type " " Request_Class " " Request_Name ". " Request_Protocol " " Request_Size " " EDNSO_DO " " EDNS0_Buffersize " " Respons...
[ -0.03048868104815483, -0.017063332721590996, -0.0359194278717041, 0.010755563154816628, 0.05681290477514267, 0.022653650492429733, 0.07124434411525726, 0.007777051068842411, 0.0012445144820958376, -0.055013205856084824, 0.006654407363384962, -0.026457546278834343, -0.057145457714796066, 0....
{ "azure_component": "security", "chunk_index": 564, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "537", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Cl0p is a ransomware that operates by applying distinctive encryption keys to the victim's files and then requesting a ransom for the files' decryption. It uses a vulnerability in the data transfer software MOVEit and sends spear phishing emails to numerous employees in the hope to deliver cl0p . Then it uses tools li...
[ -0.016744812950491905, -0.06980807334184647, 0.018040748313069344, 0.012302041053771973, 0.060045868158340454, -0.027083823457360268, 0.018389325588941574, 0.04038303717970848, 0.016644200310111046, -0.042111728340387344, -0.04435350000858307, -0.04530451074242592, -0.0635194405913353, 0.0...
{ "azure_component": "security", "chunk_index": 565, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "538", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Migrate to Azure Firewall Premium Article • 03/15/2023 You can migrate Azure Firewall Standard to Azure Firewall Premium to take advantage of the new Premium capabilities. For more information about Azure Firewall Premium features, see Azure Firewall Premium features. This article guides you with the required steps to ...
[ -0.005909798666834831, -0.012794666923582554, 0.038550589233636856, -0.008540647104382515, 0.07587277889251709, 0.0023745927028357983, 0.05984227731823921, 0.004913363605737686, 0.03959910199046135, -0.022638019174337387, -0.04219914600253105, -0.02991124428808689, -0.0392380990087986, 0.0...
{ "azure_component": "security", "chunk_index": 566, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "539", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Performance is a consideration when migrating from the standard SKU. IDPS and TLS inspection are compute intensive operations. The premium SKU uses a more powerful VM SKU, which scales to a higher throughput comparable with the standard SKU. For more information about Azure Firewall Performance, see Azure Firewall Perf...
[ -0.013736573979258537, 0.00198484119027853, 0.029605837538838387, 0.028140461072325706, 0.07747729867696762, 0.0023313299752771854, 0.04675452038645744, 0.013260697945952415, 0.02621915191411972, -0.022933494299650192, -0.018748294562101364, -0.04217297211289406, -0.04823501035571098, 0.01...
{ "azure_component": "security", "chunk_index": 567, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "540", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Transform-Policy.ps1 is an Azure PowerShell script that creates a new Premium policy from an existing Standard policy. Given a standard firewall policy ID, the script transforms it to a Premium Azure firewall policy. The script first connects to your Azure account, pulls the policy, transforms/adds various parameters, ...
[ -0.0300523079931736, 0.0000723396660760045, 0.023491578176617622, 0.002021076390519738, 0.08690702170133591, 0.013532592914998531, 0.0018538287840783596, -0.03240543231368065, 0.010486334562301636, -0.033846545964479446, -0.026646429672837257, -0.004240684676915407, -0.06790202856063843, -...
{ "azure_component": "security", "chunk_index": 568, "contains_sku": true, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "541", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
param ( #Resource id of the azure firewall policy. [Parameter(Mandatory=$true)] [string] $PolicyId, #new filewallpolicy name, if not specified will be the previous name with the '_premium' suffix [Parameter(Mandatory=$false)] [string] $NewPolicyName = "" ) $ErrorActionPreference = "Sto...
[ -0.019752943888306618, -0.006977949291467667, 0.013605884276330471, 0.03362194076180458, 0.05074996501207352, 0.039798978716135025, 0.018538599833846092, -0.0476045198738575, -0.004544560797512531, -0.02917247824370861, -0.02794237993657589, -0.008839068002998829, -0.05572301521897316, 0.0...
{ "azure_component": "security", "chunk_index": 569, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "542", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
} function TransformPolicyToPremium { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicy] $Policy ) $NewPolicyParameters = @{ Name = (GetPolicyNewName -Policy $Policy) ...
[ -0.028713926672935486, -0.03213336318731308, 0.029506780207157135, 0.008736318908631802, 0.0660586953163147, 0.0026969732716679573, 0.04162583872675896, -0.07330825924873352, -0.008619053289294243, -0.04581975191831589, -0.020683065056800842, -0.010455548763275146, -0.075788713991642, 0.03...
{ "azure_component": "security", "chunk_index": 570, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "543", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
If you use Azure Firewall Standard SKU with firewall policy, you can use the Allocate/Deallocate method to migrate your Firewall SKU to Premium. This migration approach is supported on both VNet Hub and Secure Hub Firewalls. When you migrate a Secure Hub deployment, it will preserve the firewall public IP address. The ...
[ -0.028687484562397003, -0.007475772872567177, 0.04217136278748512, 0.03070172294974327, 0.0683760941028595, 0.008560135960578918, 0.040842205286026, -0.009969540871679783, 0.019987942650914192, -0.01329178735613823, -0.06716439872980118, -0.006151055451482534, -0.07735387980937958, 0.00459...
{ "azure_component": "security", "chunk_index": 571, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "544", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Allocate Firewall Premium (multiple public IP addresses) Azure PowerShell Allocate Firewall Premium in Forced Tunnel Mode Azure PowerShell Deallocate the Standard Firewall Azure PowerShell $azfw = Get-AzFirewall -Name "<firewall-name>" -ResourceGroupName " <resource-group-name>" $azfw.Sku.Tier="Premium" $vnet = Get-AzV...
[ -0.01935659907758236, 0.009446537122130394, -0.007882141508162022, 0.03438140079379082, 0.05202493444085121, 0.02562566101551056, 0.04172058030962944, -0.004938312340527773, 0.02344219759106636, -0.016606755554676056, -0.06449029594659805, 0.003695147577673197, -0.06501910835504532, -0.021...
{ "azure_component": "security", "chunk_index": 572, "contains_sku": true, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "545", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Allocate Firewall Premium Azure PowerShell You can attach a Premium policy to the new Premium Firewall using the Azure portal: Learn more about Azure Firewall Premium features $azfw = Get-AzFirewall -Name "<firewall-name>" -ResourceGroupName " <resource-group-name>" $azfw.Deallocate() Set-AzFirewall -AzureFirewall $azf...
[ -0.007283839397132397, 0.017962485551834106, 0.03163572773337364, 0.021926293149590492, 0.05110911652445793, 0.03144994378089905, 0.025215348228812218, -0.02932584099471569, 0.02359158731997013, -0.03922314941883087, -0.07646853476762772, -0.006927999202162027, -0.08209557086229324, -0.013...
{ "azure_component": "security", "chunk_index": 573, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "546", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Migrate Azure Firewall Standard to Premium using Terraform Article • 10/27/2023 Terraform enables the definition, preview, and deployment of cloud infrastructure. Using Terraform, you create configuration files using HCL syntax . The HCL syntax allows you to specify the cloud provider - such as Azure - and the element...
[ 0.0071948436088860035, 0.006871172226965427, -0.0032446763943880796, 0.025470033288002014, 0.09032279998064041, 0.01281039696186781, 0.03656642511487007, 0.02828134037554264, 0.007941904477775097, -0.030334798619151115, -0.0622992143034935, -0.009951367974281311, -0.048210274428129196, 0.0...
{ "azure_component": "security", "chunk_index": 574, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "547", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Terraform resource "random_pet" "prefix" { prefix = var.prefix length = 1 } resource "azurerm_resource_group" "rg" { name = "${random_pet.prefix.id}-rg" location = var.resource_group_location } resource "azurerm_virtual_network" "vnet" { name = "${random_pet.prefix.id}-vnet" address_space...
[ 0.0395263209939003, -0.030200496315956116, -0.010138633660972118, 0.01931520737707615, 0.06951375305652618, 0.011504669673740864, 0.0505182221531868, 0.022352125495672226, -0.01416180282831192, -0.07461332529783249, -0.025221822783350945, -0.02726495824754238, -0.053373001515865326, 0.0303...
{ "azure_component": "security", "chunk_index": 575, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "548", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
3. Create a file named variables.tf and insert the following code: Terraform rule { name = "testrule" source_addresses = [ "10.0.0.0/16", ] target_fqdns = [ "*.google.com", ] protocol { port = "443" type = "Https" } } } resource "azurerm_firewall_network_rule_col...
[ 0.0413057841360569, -0.008782046847045422, -0.03356149420142174, 0.0293473731726408, 0.07522804290056229, 0.02630164474248886, 0.05562684312462807, 0.0222418624907732, 0.006441913079470396, -0.06629226356744766, -0.026499608531594276, 0.0005196213023737073, -0.07302738726139069, 0.06329306...
{ "azure_component": "security", "chunk_index": 576, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "549", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Run terraform init to initialize the Terraform deployment. This command downloads the Azure provider required to manage your Azure resources. Console Key points: The -upgrade parameter upgrades the necessary provider plugins to the newest version that complies with the configuration's version constraints. Run terrafo...
[ 0.017893942072987556, -0.03078003227710724, -0.023051269352436066, -0.02816700004041195, 0.08865198493003845, 0.03993052616715431, 0.027350593358278275, 0.013175693340599537, 0.0012850576313212514, -0.07659924030303955, -0.05626308545470238, 0.008292900398373604, -0.042924001812934875, 0.0...
{ "azure_component": "security", "chunk_index": 577, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "550", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
The optional -out parameter allows you to specify an output file for the plan. Using the -out parameter ensures that the plan you reviewed is exactly what is applied. Run terraform apply to apply the execution plan to your cloud infrastructure. Console Key points: The example terraform apply command assumes you pre...
[ 0.006223016884177923, -0.013711117208003998, -0.0015690597938373685, -0.026765594258904457, 0.06076034530997276, 0.0401742197573185, 0.009544542990624905, -0.011892477050423622, 0.007494157645851374, -0.06608374416828156, -0.05782861262559891, 0.0016921277856454253, -0.056847695261240005, ...
{ "azure_component": "security", "chunk_index": 578, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "551", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Open the main.tf file, and make the following changes: 1. Add the following 'data' section: Terraform 2. Modify the firewall resource: Terraform 3. Delete the classic rule collections: Terraform 7. Edit the Terraform configuration file to migrate the firewall data "azurerm_firewall_policy" "prem-pol" { name ...
[ 0.0019194938940927386, -0.0038586673326790333, 0.016290774568915367, 0.0029583568684756756, 0.10764652490615845, -0.002717921743169427, 0.046581070870161057, -0.003881043754518032, -0.0051297456957399845, -0.0618550144135952, -0.0459931418299675, 0.02215873822569847, -0.06696818023920059, ...
{ "azure_component": "security", "chunk_index": 579, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "552", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
1. terraform plan -out main.tfplan 2. terraform apply main.tfplan 1. Select the test-resources resource group. target_fqdns = [ "*.google.com", ] protocol { port = "443" type = "Https" } } } resource "azurerm_firewall_network_rule_collection" "net-rc" { name = "nette...
[ 0.025843312963843346, -0.022614959627389908, 0.0057928357273340225, -0.014685153029859066, 0.10267452895641327, 0.005416003987193108, 0.022881722077727318, 0.030336396768689156, 0.00987220462411642, -0.07684359699487686, -0.016256581991910934, 0.014585690572857857, -0.06176028400659561, 0....
{ "azure_component": "security", "chunk_index": 580, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "553", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
2. Select the testfirewall resource. 3. Verify the Firewall sku is Premium. 4. Verify the firewall is using the prem-pol firewall policy. When you no longer need the resources created via Terraform, do the following steps: 1. Run terraform plan and specify the destroy flag. Console Key points: The terraform plan com...
[ 0.02437310479581356, 0.0038157005328685045, -0.0034863529726862907, -0.0048830448649823666, 0.08069673925638199, 0.011834490112960339, 0.009120209142565727, 0.018323687836527824, -0.018904054537415504, -0.049703966826200485, -0.05375207960605621, 0.03222817927598953, -0.050179220736026764, ...
{ "azure_component": "security", "chunk_index": 581, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "554", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Feedback Was this page helpful? Provide product feedback | Get help at Microsoft Q&A Troubleshoot common problems when using Terraform on Azure Troubleshoot Terraform on Azure Next steps Learn more about using Terraform in Azure Yes No
[ 0.07458116859197617, -0.011236892081797123, -0.02037188597023487, 0.019354408606886864, 0.04999417066574097, 0.0262610986828804, 0.023186001926660538, 0.055929869413375854, 0.00794991385191679, -0.05287995934486389, 0.0019945211242884398, -0.019254526123404503, -0.044916197657585144, 0.041...
{ "azure_component": "security", "chunk_index": 582, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "555", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall easy upgrade/downgrade Article • 04/11/2023 You can now easily upgrade your existing Firewall Standard SKU to Premium SKU and downgrade from Premium to Standard SKU. In the upgrade process, you can select the policy to be attached to the upgraded Premium SKU. You can select an existing Premium Policy or ...
[ -0.005846122745424509, -0.024213707074522972, 0.04630068317055702, 0.025656891986727715, 0.06310351938009262, 0.00290291802957654, 0.02968292124569416, 0.0005971043137833476, 0.027140026912093163, -0.035244621336460114, -0.029645882546901703, -0.011624478735029697, -0.06541474163532257, 0....
{ "azure_component": "security", "chunk_index": 583, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "556", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
To learn more about Azure Firewall, see What is Azure Firewall?. This new upgrade/downgrade capability doesn't currently support the Azure Firewall Basic SKU. Next steps
[ -0.0009394289227202535, -0.04749765619635582, 0.05134269967675209, 0.001646870980039239, 0.05578495189547539, -0.034177567809820175, 0.04817755147814751, 0.016434984281659126, 0.02823786251246929, -0.034309279173612595, 0.024759748950600624, 0.01152235921472311, -0.06262248754501343, 0.045...
{ "azure_component": "security", "chunk_index": 584, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "557", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Monitor Azure Firewall Article • 04/15/2025 This article describes: The types of monitoring data you can collect for this service. Ways to analyze that data. When you have critical applications and business processes that rely on Azure resources, you need to monitor and get alerts for your system. The Azure Monitor ser...
[ 0.04234375059604645, 0.00917161162942648, 0.02845153398811817, -0.02388891391456127, 0.07143229246139526, 0.0034939581528306007, 0.04227769747376442, 0.022778719663619995, -0.0024009987246245146, -0.061184145510196686, -0.007339315488934517, -0.005290625616908073, -0.07287295907735825, 0.0...
{ "azure_component": "security", "chunk_index": 585, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "558", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure uses the concept of resource types and IDs to identify everything in a subscription. Resource types are also part of the resource IDs for every resource running in Azure. For example, one resource type for a virtual machine is Microsoft.Compute/virtualMachines . For a list of services and their associated resourc...
[ 0.03444322571158409, 0.018465790897607803, -0.00603907648473978, 0.011957275681197643, 0.0722668245434761, 0.024574439972639084, 0.029084235429763794, -0.002220075111836195, -0.034656185656785965, -0.05694946274161339, 0.009245941415429115, -0.02618209272623062, -0.06943003088235855, 0.052...
{ "azure_component": "security", "chunk_index": 586, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "559", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Routing: You can also route some platform metrics to Azure Monitor Logs / Log Analytics so you can query them with other log data. Check the DS export setting for each metric to see if you can use a diagnostic setting to route the metric to Azure Monitor Logs / Log Analytics. For more information, see the Metrics diagn...
[ 0.02927495911717415, 0.004574610386043787, -0.008910585194826126, -0.009669313207268715, 0.10069870203733444, 0.008371984586119652, 0.04187075048685074, 0.024446284398436546, -0.007672479841858149, -0.0866067036986351, 0.014135638251900673, -0.0379427932202816, -0.0591416135430336, 0.01591...
{ "azure_component": "security", "chunk_index": 587, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "560", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
deployed across Azure, and combine them into unified interactive experiences. You can also connect to your storage account and retrieve the JSON log entries for access and performance logs. After you download the JSON files, you can convert them to CSV and view them in Excel, Power BI, or any other data-visualization t...
[ 0.022685576230287552, -0.011773177422583103, 0.008759849704802036, -0.021604085341095924, 0.09597256034612656, -0.015042523853480816, 0.02893461473286152, 0.026002369821071625, -0.026324491947889328, -0.061813078820705414, -0.005557395052164793, -0.05472180247306824, -0.07488074153661728, ...
{ "azure_component": "security", "chunk_index": 588, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "561", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
This capability can help you track changes made to your firewall rules helping ensure accountability for a sensitive resource like a firewall. Structured logs are a type of log data that are organized in a specific format. They use a predefined schema to structure log data in a way that makes it easy to search, filter,...
[ 0.01529107429087162, 0.010922842659056187, 0.0026900917291641235, -0.02581642009317875, 0.07380443811416626, -0.02072206139564514, 0.027005067095160484, -0.033440716564655304, -0.021503612399101257, -0.036534350365400314, 0.007731666788458824, -0.0314396396279335, -0.05813802033662796, 0.0...
{ "azure_component": "security", "chunk_index": 589, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "562", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
settings need to be created per firewall. In Resource specific mode, individual tables in the selected workspace are created for each category selected in the diagnostic setting. This method is recommended since it: might reduce overall logging costs by up to 80%. makes it much easier to work with the data in log queri...
[ 0.003277704818174243, 0.016723381355404854, 0.0075030201114714146, 0.008361902087926865, 0.07011903077363968, -0.001873426022939384, 0.044436898082494736, -0.010491319932043552, -0.013281647115945816, -0.05569902062416077, -0.019159002229571342, -0.02865838073194027, -0.09377681463956833, ...
{ "azure_component": "security", "chunk_index": 590, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "563", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
All resource specific tables now support the Basic table plan, which can reduce logging costs by up to 80%. For more information on the limitations and differences of this new logging plan, see Azure Monitor Logs. To learn about the new querying experience, see Query data in a basic and auxiliary table. To enable Azure...
[ -0.014664064161479473, 0.0369083471596241, 0.01060798391699791, 0.005316763184964657, 0.09958913177251816, -0.02842378243803978, 0.055830568075180054, -0.02110041305422783, 0.006455265451222658, -0.02605743147432804, -0.023051489144563675, -0.005782374646514654, -0.06783970445394516, 0.019...
{ "azure_component": "security", "chunk_index": 591, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "564", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
A list of predefined queries is available in the Azure portal. This list has a predefined KQL (Kusto Query Language) log query for each category and joined query showing the entire Azure firewall logging events in single view. Structured log queries
[ -0.03288307413458824, -0.0009341067634522915, 0.009244571439921856, -0.005693476181477308, 0.08898913115262985, -0.0036488657351583242, 0.05478263273835182, -0.01586128957569599, -0.0160383190959692, -0.007006962783634663, -0.04927219823002815, -0.03138680011034012, -0.04646335169672966, 0...
{ "azure_component": "security", "chunk_index": 592, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "565", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You can use it to create rich visual reports within the Azure portal. You can tap into multiple firewalls deployed across Azure and combine them into unified interactive experiences. To deploy the new workbook that uses Azure Firewall ...
[ -0.014414282515645027, 0.02631465718150139, 0.004394855350255966, -0.05608321353793144, 0.10255200415849686, -0.006155717186629772, 0.017433781176805496, -0.04056333005428314, 0.00814216397702694, -0.06954627484083176, -0.029934389516711235, -0.017989790067076683, -0.07456337660551071, 0.0...
{ "azure_component": "security", "chunk_index": 593, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "566", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
The Application rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that matches one of your configured application rules results in a log for the accepted/denied connection. The data is logged in JSON format...
[ -0.011831622570753098, -0.01989530771970749, 0.036531828343868256, -0.029493995010852814, 0.07002946734428406, -0.03374996781349182, 0.07835040986537933, 0.004375486169010401, -0.01799916662275791, -0.046895768493413925, -0.01142461970448494, -0.03542579337954521, -0.07721453160047531, 0.0...
{ "azure_component": "security", "chunk_index": 594, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "567", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
The Network rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that matches one of your configured network rules results in a log for the accepted/denied connection. The data is logged in JSON format, as sho...
[ -0.02903013676404953, -0.031817469745874405, 0.011291907168924809, -0.009045973420143127, 0.0807441845536232, -0.013156428933143616, 0.0521378368139267, 0.02062295749783516, -0.02193807251751423, -0.05247312784194946, 0.007301675155758858, -0.030495092272758484, -0.07445608824491501, 0.047...
{ "azure_component": "security", "chunk_index": 595, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "568", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
JSON Failed: JSON Message format: Console There are many tools for analyzing monitoring data. { "category": "AzureFirewallDnsProxy", "time": "2020-09-02T19:12:33.751Z", "resourceId": "/SUBSCRIPTIONS/{subscriptionId}/RESOURCEGROUPS/{resourceGroupName}/PROVIDERS/MICR OSOFT.NETWORK/AZUREFIREWALLS/{resourceName}", ...
[ -0.0304583627730608, -0.028934461995959282, -0.020720243453979492, 0.0057952068746089935, 0.0371074452996254, 0.04094523936510086, 0.05977486073970795, 0.020892716944217682, -0.012126743793487549, -0.06771406531333923, -0.007333387620747089, -0.021573754027485847, -0.07687415182590485, 0.0...
{ "azure_component": "security", "chunk_index": 596, "contains_sku": true, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "569", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Monitor supports the following basic tools: Metrics explorer, a tool in the Azure portal that allows you to view and analyze metrics for Azure resources. For more information, see Analyze metrics with Azure Monitor metrics explorer. Log Analytics, a tool in the Azure portal that allows you to query and analyze lo...
[ 0.018081458285450935, -0.009598519653081894, 0.010153384879231453, -0.02777154929935932, 0.0920797660946846, -0.025121381506323814, 0.0230480395257473, 0.020664799958467484, -0.012195855379104614, -0.06537563353776932, 0.008786383084952831, -0.018953152000904083, -0.0722770094871521, 0.032...
{ "azure_component": "security", "chunk_index": 597, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "570", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
You can analyze monitoring data in the Azure Monitor Logs / Log Analytics store by using the Kusto query language (KQL). For a list of common queries for any service, see the Log Analytics queries interface. Azure Monitor alerts proactively notify you when specific conditions are found in your monitoring data. Alerts a...
[ 0.027629993855953217, -0.006665763445198536, 0.010304361581802368, -0.02085035853087902, 0.08101833611726761, -0.016151076182723045, 0.04408776015043259, 0.026248037815093994, -0.010612403973937035, -0.04152515158057213, -0.020133379846811295, -0.02704366110265255, -0.08020209521055222, 0....
{ "azure_component": "security", "chunk_index": 598, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "571", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Log alerts allow users to use a Log Analytics query to evaluate resource logs at a predefined frequency. Activity log alerts trigger when a new activity log event occurs that matches defined conditions. Resource Health alerts and Service Health alerts are activity log alerts that report on your service and resource hea...
[ 0.010449172928929329, 0.009033638052642345, 0.0070515843108296394, -0.021106185391545296, 0.0797659158706665, -0.015451588667929173, 0.04896341636776924, 0.007621327415108681, -0.02764110639691353, -0.060357026755809784, -0.018932508304715157, -0.012778800912201405, -0.07177845388650894, 0...
{ "azure_component": "security", "chunk_index": 599, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "572", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Browse to the workspace configured in the metrics diagnostics settings. Check if metrics are available using the following query: Kusto Create alert to track receiving firewall metrics without any failures AzureMetrics | where MetricName contains "FirewallHealth"
[ 0.0010410512331873178, 0.007012412417680025, 0.007446145173162222, -0.030037950724363327, 0.09807707369327545, 0.021768854930996895, 0.061670493334531784, 0.017584767192602158, -0.01709645427763462, -0.04815393313765526, -0.046905435621738434, 0.006840270943939686, -0.008063636720180511, 0...
{ "azure_component": "security", "chunk_index": 600, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "573", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Next, create an alert for missing metrics over a time period of 60 minutes. To set up new alerts on missing metrics, browse to the Alert page in the log analytics workspace. You can set alerts for any metric, log entry, or activity log entry listed in the Azure Firewall monitoring data reference. | where ResourceId con...
[ 0.029925936833024025, 0.0016830762615427375, 0.03652598336338997, -0.008528662845492363, 0.07820186018943787, -0.01023744698613882, 0.07038048654794693, 0.011297899298369884, -0.03793017193675041, -0.03995464742183685, -0.02906891144812107, 0.009767062030732632, -0.05617108941078186, -0.01...
{ "azure_component": "security", "chunk_index": 601, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "574", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
For some services, if critical conditions or imminent changes occur during resource operations, an alert displays on the service Overview page in the portal. You can find more information and recommended fixes for the alert in Advisor recommendations under Monitoring in the left menu. During normal operations, no advis...
[ 0.016428900882601738, -0.02564295008778572, 0.035972289741039276, -0.04436945542693138, 0.07450244575738907, -0.03679511323571205, 0.03255081921815872, 0.0561380609869957, -0.032670531421899796, -0.052014198154211044, -0.04234059154987335, 0.0287109836935997, -0.05868866294622421, 0.020645...
{ "azure_component": "security", "chunk_index": 602, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "575", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Using Azure Firewall Workbooks Article • 12/06/2023 Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You can use it to create rich visual reports within the Azure portal. You can tap into multiple Firewalls deployed across Azure, and combine them into unified interactive experiences....
[ 0.024009360000491142, 0.04149983450770378, 0.016846798360347748, -0.036599300801754, 0.09039758145809174, -0.01336364634335041, 0.034966032952070236, -0.023120064288377762, 0.011888397857546806, -0.06414289772510529, -0.05440161004662514, -0.03632105141878128, -0.06647549569606781, 0.03861...
{ "azure_component": "security", "chunk_index": 603, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "576", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
4. Select the log analytics workspace and one or more firewall names you want to use in this workbook as shown here: The Azure Firewall workbook has seven tabs, each addressing distinct aspects of the service. The following sections describe each tab. The overview tab showcases graphs and statistics related to all type...
[ -0.023228701204061508, 0.036622557789087296, -0.01639946922659874, -0.019491717219352722, 0.08979778736829758, 0.01319441944360733, 0.06041044369339943, -0.018118951469659805, -0.006559367291629314, -0.039876725524663925, -0.048765894025564194, -0.023853199556469917, -0.073458731174469, 0....
{ "azure_component": "security", "chunk_index": 604, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "577", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Events, by time: Displays event frequency over time. Events, by firewall over time: Shows event distribution across firewalls over time. Events, by category: Categorizes and counts events. Events categories, by time: Displays event categories over time. Average throughput of firewall traffic: Shows average data passing...
[ -0.008812726475298405, -0.01663762703537941, 0.0021599014289677143, -0.0746951624751091, 0.04872490093111992, -0.006743257865309715, 0.01600594073534012, 0.036304280161857605, -0.04703299701213837, -0.0168487299233675, -0.025443261489272118, -0.03341791406273842, -0.047039300203323364, 0.0...
{ "azure_component": "security", "chunk_index": 605, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "578", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
The Network rules tab shows Layer 4 related events statistics correlated with your specific network rules in Azure Firewall policy. The following widgets are available in the Network rules tab: Rule actions: Displays actions taken by rules. Target ports: Shows targeted ports in network traffic. DNAT actions: Displays a...
[ -0.009210330434143543, -0.027669787406921387, -0.0031406411435455084, -0.05513893440365791, 0.05109725520014763, -0.025060568004846573, 0.02288929931819439, -0.007775257807224989, 0.02190347947180271, -0.03609275072813034, -0.014353319071233273, -0.03584036976099014, -0.06337885558605194, ...
{ "azure_component": "security", "chunk_index": 606, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "579", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
This tab is relevant if you've set up Azure Firewall to function as a DNS proxy, serving as an intermediary for DNS requests from client virtual machines to a DNS server. The DNS Proxy tab includes various widgets that you can use: DNS Proxy Traffic by count per Firewall: Displays DNS proxy traffic count for each firew...
[ -0.01097665261477232, -0.011338390409946442, -0.009745366871356964, -0.024714121595025063, 0.05370739847421646, 0.03220412880182266, 0.0385747067630291, 0.0014909106539562345, -0.018232621252536774, -0.05271408334374428, -0.03502129763364792, 0.005954911932349205, -0.049718718975782394, 0....
{ "azure_component": "security", "chunk_index": 607, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "580", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
The IDPS log statistics tab offers a summary of malicious traffic events and the preventive actions undertaken by the service. In the IDPS tab, you'll find various widgets that you can use: IDPS Actions Count: Counts IDPS actions. IDPS Protocol Count: Counts protocols detected by IDPS. IDPS SignatureID Count: Counts ID...
[ -0.025366472080349922, -0.025185072794556618, 0.00657305121421814, -0.01605970226228237, 0.059493277221918106, 0.009691602550446987, 0.051184456795454025, -0.002677731215953827, 0.008484290912747383, -0.055397748947143555, -0.008874740451574326, -0.03035726211965084, -0.05144017934799194, ...
{ "azure_component": "security", "chunk_index": 608, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "581", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall Threat Intel Over Time: Displays Azure Firewall Threat Intelligence detections over time. Azure Firewall Threat Intel: Provides logs from Azure Firewall's Threat Intelligence. The investigation section enables exploration and troubleshooting, offering additional details such as the virtual machine name a...
[ -0.030052758753299713, -0.009215709753334522, -0.005702237598598003, -0.015505376271903515, 0.07087162882089615, 0.023487737402319908, 0.04252170771360397, 0.01093092281371355, -0.0028942434582859278, -0.06078847870230675, -0.016220631077885628, -0.027164269238710403, -0.04144573584198952, ...
{ "azure_component": "security", "chunk_index": 609, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "582", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Learn more about Azure Firewall Diagnostics  Next steps
[ 0.008548468351364136, 0.0072068022564053535, 0.027725012972950935, 0.02015233226120472, 0.059088192880153656, 0.003109469311311841, 0.070924773812294, 0.00442660553380847, 0.010129770264029503, -0.0593307726085186, 0.03017061948776245, -0.0014756486052647233, -0.022818410769104958, -0.0056...
{ "azure_component": "security", "chunk_index": 610, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "583", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall threat intelligence-based filtering Article • 08/09/2023 You can enable Threat intelligence-based filtering for your firewall to alert and deny traffic from/to known malicious IP addresses, FQDNs, and URLs. The IP addresses, domains and URLs are sourced from the Microsoft Threat Intelligence feed, which ...
[ -0.015562277287244797, -0.006096989847719669, 0.033780504018068314, -0.02262568287551403, 0.07488976418972015, -0.016551455482840538, 0.04022888094186783, -0.016608906909823418, -0.0037079935427755117, -0.04208923503756523, -0.03044765256345272, -0.015484808944165707, -0.07044460624456406, ...
{ "azure_component": "security", "chunk_index": 611, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "584", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
The following log excerpt shows a triggered rule: JSON Outbound testing - Outbound traffic alerts should be a rare occurrence, as it means that your environment is compromised. To help test outbound alerts are working, a test FQDN exists that triggers an alert. Use testmaliciousdomain.eastus.cloudapp.azure.com for you...
[ -0.014494170434772968, -0.030881892889738083, 0.032891761511564255, 0.004306004848331213, 0.058821141719818115, -0.033775608986616135, 0.07339683175086975, 0.0147166196256876, -0.014665549620985985, -0.0470912903547287, -0.011396467685699463, 0.016453098505735397, -0.07576923817396164, 0.0...
{ "azure_component": "security", "chunk_index": 612, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "585", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Ensure that the tested HTTP/S request is allowed using an application rule, not a network rule. Inbound testing - You can expect to see alerts on incoming traffic if the firewall has DNAT rules configured. You'll see alerts even if the firewall only allows specific sources on the DNAT rule and traffic is otherwise deni...
[ 0.0021109282970428467, -0.01235335785895586, 0.01967378333210945, -0.01376441027969122, 0.05568542331457138, -0.05407201498746872, 0.04625774547457695, -0.019919758662581444, 0.011181550100445747, -0.030993657186627388, -0.024540327489376068, 0.009443660266697407, -0.0805014818906784, 0.00...
{ "azure_component": "security", "chunk_index": 613, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "586", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Best practices for Azure Firewall performance Article • 01/13/2025 To maximize the performance of your Azure Firewall and Firewall policy, it’s important to follow best practices. However, certain network behaviors or features can affect the firewall’s performance and latency, despite its performance optimization capab...
[ -0.02935427986085415, -0.0029226569458842278, 0.006857883185148239, -0.00394592946395278, 0.06237339973449707, -0.024790549650788307, 0.04857763648033142, 0.0020775562152266502, -0.006250256206840277, -0.043780915439128876, -0.018957672640681267, -0.05078935623168945, -0.05396449565887451, ...
{ "azure_component": "security", "chunk_index": 614, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "587", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Ensure that you are within the following rule limitations. Use or migrate to Azure Firewall Premium Azure Firewall Premium uses advanced hardware and offers a higher- performing underlying engine. Best for heavier workloads and higher traffic volumes. It also includes built-in accelerated networking software, which can...
[ -0.010934196412563324, -0.03634163364768028, 0.006075715646147728, 0.0016855522990226746, 0.04261261224746704, -0.013263942673802376, 0.07173590362071991, 0.008594810031354427, -0.027287540957331657, -0.05867113545536995, -0.024635665118694305, -0.018768806010484695, -0.048758912831544876, ...
{ "azure_component": "security", "chunk_index": 615, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "588", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Feedback Was this page helpful? Provide product feedback | Get help at Microsoft Q&A Measure firewall latency using latency probe metrics Use the latency probe metric to measure the average latency of the Azure Firewall. This metric provides an indirect metric of the firewall’s performance. Remember that intermittent ...
[ 0.029997391626238823, -0.03223872184753418, 0.007085567340254784, -0.004736600909382105, 0.05902087315917015, -0.00345264608040452, 0.027684686705470085, 0.02276570349931717, -0.00374020473100245, -0.059414781630039215, 0.000727986334823072, -0.03797748312354088, -0.0156460739672184, 0.003...
{ "azure_component": "security", "chunk_index": 616, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "589", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Relocate Azure Firewall to another region Article • 04/11/2025 This article shows you how to relocate an Azure Firewall that protects an Azure Virtual Network. We highly recommend that you use Premium SKU. If you are on Standard SKU, consider migrating from an existing Standard SKU Azure Firewall to Premium SKU before ...
[ -0.007016106508672237, -0.015531928278505802, 0.03550179302692413, 0.030076701194047928, 0.07678753137588501, 0.013502031564712524, 0.03281105309724808, -0.019581235945224762, 0.011635266244411469, -0.030242865905165672, -0.06892609596252441, -0.041284896433353424, -0.043920569121837616, 0...
{ "azure_component": "security", "chunk_index": 617, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "590", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
1. Sign in to the Azure portal . 2. Select All resources and then select your Azure Firewall resource. 3. On the Azure Firewall page, select Export template under Automation in the left menu. 4. Choose Download in the Export template page. 5. Locate the .zip file that you downloaded from the portal, and unzip that file...
[ -0.002288504270836711, 0.016992291435599327, -0.006231109146028757, 0.00788436271250248, 0.08358030021190643, -0.0001716829719953239, 0.019242404028773308, 0.0002846703864634037, 0.007586848456412554, -0.04541601613163948, -0.05527835711836815, -0.04848446696996689, -0.04044722393155098, 0...
{ "azure_component": "security", "chunk_index": 618, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "591", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
6. Select Build your own template in the editor. 7. Select Load file, and then follow the instructions to load the template.json file that you downloaded in the previous section 8. In the template.json file, replace: firewallName with the default value of your Azure Firewall name. azureFirewallPublicIpId with the I...
[ 0.021415913477540016, 0.014851638115942478, -0.012029395438730717, 0.010584641247987747, 0.07204748690128326, 0.02346310205757618, 0.05111946538090706, 0.012224366888403893, 0.01023948285728693, -0.0752413272857666, -0.033102311193943024, -0.029080573469400406, -0.06215789541602135, 0.0255...
{ "azure_component": "security", "chunk_index": 619, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "592", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Diagnostic Settings. When recreating the Azure Firewall in the target region, be sure to review the Diagnostic Setting and configure it to reflect the target region (Log Analytics workspace, storage account, event hubs, or 3rd-party partner solution). 12. Edit the location property in the template.json file to the ta...
[ 0.019873641431331635, -0.0058815572410821915, 0.020744463428854942, 0.004883966874331236, 0.0937727764248848, 0.032959286123514175, 0.03796079009771347, 0.025375772267580032, 0.02094097062945366, -0.07063660025596619, -0.017744820564985275, -0.06617416441440582, -0.05501491203904152, 0.006...
{ "azure_component": "security", "chunk_index": 620, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "593", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Move resources to a new resource group or subscription Move Azure VMs to another region
[ -0.00019538431661203504, -0.027190862223505974, 0.04577425494790077, 0.04350678622722626, 0.07250098884105682, 0.02086443267762661, 0.040639977902173996, -0.004644065164029598, -0.013083664700388908, -0.05240848660469055, -0.057183124125003815, 0.009653657674789429, -0.06065046042203903, 0...
{ "azure_component": "security", "chunk_index": 621, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "594", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall remote work support Article • 03/24/2022 Azure Firewall is a managed, cloud-based network security service that protects your Azure virtual network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. Work from home policies requires m...
[ 0.04486460238695145, 0.010601740330457687, 0.042026106268167496, 0.021550273522734642, 0.06153503432869911, -0.0004248494515195489, 0.06270189583301544, -0.015146494843065739, 0.007549431640654802, -0.033975791186094284, -0.048417482525110245, -0.018694352358579636, -0.04711746424436569, 0...
{ "azure_component": "security", "chunk_index": 622, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": true, "service_name": "Azure Firewall", "source": "595", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall known issues and limitations Article • 04/14/2025 This article lists the known issues for Azure Firewall and is updated as they're resolved. For Azure Firewall limitations, see Azure subscription and service limits, quotas, and constraints. Azure Firewall Standard has the following known issues: Issue De...
[ 0.01175488531589508, -0.024037502706050873, -0.020435143262147903, -0.0010924579109996557, 0.06670772284269333, -0.0030144506599754095, 0.06334678828716278, 0.0008184554171748459, 0.02240607887506485, -0.031159674748778343, -0.047274377197027206, -0.047596275806427, -0.07180768251419067, 0...
{ "azure_component": "security", "chunk_index": 623, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "596", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Issue Description Mitigation limited to the Standard and Premium Firewall versions. Network filtering rules for non-TCP/UDP protocols (for example ICMP) don't work for Internet bound traffic Network filtering rules for non- TCP/UDP protocols don't work with SNAT to your public IP address. Non-TCP/UDP protocols are supp...
[ -0.024114979431033134, -0.013658195734024048, -0.01274569146335125, 0.004703359678387642, 0.05674733221530914, -0.014980140142142773, 0.03866187110543251, 0.009552755393087864, 0.01839488372206688, -0.058427274227142334, -0.002350150141865015, -0.011370720341801643, -0.07708755135536194, 0...
{ "azure_component": "security", "chunk_index": 624, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "597", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
and CLI support for ICMP Azure PowerShell and CLI don't support ICMP as a valid protocol in network rules. It's still possible to use ICMP as a protocol via the portal and the REST API. We're working to add ICMP in PowerShell and CLI soon. FQDN tags require a protocol: port to be set Application rules with FQDN tags re...
[ -0.018083956092596054, -0.027379192411899567, -0.006366036366671324, -0.010068275034427643, 0.07047130167484283, -0.07012772560119629, 0.03429168462753296, 0.018086059018969536, 0.006423206068575382, -0.034353870898485184, -0.02667541429400444, 0.030215464532375336, -0.09162747859954834, 0...
{ "azure_component": "security", "chunk_index": 625, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "597", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Issue Description Mitigation when configured to alert only mode. With secured virtual hubs, availability zones can only be configured during deployment. You can't configure Availability Zones after a firewall with secured virtual hubs is deployed. This is by design. SNAT on inbound connections Inbound DNAT rules always...
[ 0.012136389501392841, -0.013104218989610672, 0.02381161041557789, 0.017220493406057358, 0.05975920334458351, -0.035412196069955826, 0.03554164618253708, 0.013953001238405704, -0.017043722793459892, -0.04982396587729454, -0.055445604026317596, -0.03998807817697525, -0.09377501904964447, 0.0...
{ "azure_component": "security", "chunk_index": 626, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "598", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Issue Description Mitigation guaranteed. For private IP addresses like virtual networks, VPNs, and Azure ExpressRoute, Azure Firewall supports an outbound connection on TCP port 25. SNAT port exhaustion Azure Firewall currently supports 2,496 ports per Public IP address per backend Virtual Machine Scale Set instance. B...
[ 0.0004627334710676223, -0.06754062324762344, -0.004931905306875706, 0.008112908340990543, 0.019989004358649254, 0.010566920042037964, 0.05274420976638794, 0.022071095183491707, -0.012360590510070324, -0.03963295370340347, -0.00020012409368064255, -0.02921287901699543, -0.06828899681568146, ...
{ "azure_component": "security", "chunk_index": 627, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "599", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
for the source IP address. FTP might fail when data and control channels use different source IP addresses, depending on your FTP server configuration. An explicit SNAT configuration is planned. In the meantime, you can configure your FTP server to accept data and control channels from different source IP addresses (se...
[ 0.0024030697531998158, -0.038521941751241684, -0.019748549908399582, 0.052063632756471634, 0.06461715698242188, -0.0072098951786756516, 0.030425675213336945, 0.00515918480232358, 0.02172839641571045, -0.05388404801487923, 0.0023783037904649973, -0.024635300040245056, -0.06835593283176422, ...
{ "azure_component": "security", "chunk_index": 628, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "599", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Issue Description Mitigation to ensure symmetric routing. FTP might fail when data and control channels use different source IP addresses, depending on your FTP server configuration. channels from different source IP addresses. Active FTP doesn't work when the FTP client must reach an FTP server across the internet. Ac...
[ -0.0011322314385324717, -0.05241436883807182, -0.016329897567629814, 0.010297047905623913, 0.03651592135429382, -0.02667893096804619, 0.029848139733076096, 0.019615162163972855, -0.0027464907616376877, -0.07142449170351028, -0.012439530342817307, -0.04609125852584839, -0.08510274440050125, ...
{ "azure_component": "security", "chunk_index": 629, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "600", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
connection using a network rule instead of an application rule. See Server Name Indication for software that supports SNI. Can't add firewall policy tags using the portal or Azure Resource Manager (ARM) templates Azure Firewall Policy has a patch support limitation that prevents you from adding a tag using the Azure p...
[ 0.0010185131104663014, -0.032686829566955566, -0.016116295009851456, -0.004108034539967775, 0.06103375554084778, -0.0358961820602417, 0.03911293298006058, -0.03290128335356712, -0.024797651916742325, -0.025892317295074463, -0.03616788983345032, -0.023073043674230576, -0.06503253430128098, ...
{ "azure_component": "security", "chunk_index": 630, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "600", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Issue Description Mitigation Couldn't save the tags for the resource. IPv6 not currently supported If you add an IPv6 address to a rule, the firewall fails. Use only IPv4 addresses. IPv6 support is under investigation. Removing RuleCollectionGroups using ARM templates not supported. Removing a RuleCollectionGroup using...
[ 0.014320828020572662, -0.03016524575650692, 0.01787259429693222, 0.014370198361575603, 0.02892911806702614, -0.033585742115974426, 0.029887599870562553, -0.026580533012747765, 0.00395199516788125, -0.04614895209670067, -0.022870469838380814, -0.02721903659403324, -0.07462366670370102, 0.05...
{ "azure_component": "security", "chunk_index": 631, "contains_sku": true, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "601", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Issue Description Mitigation ESNI support for FQDN resolution in HTTPS Encrypted SNI isn't supported in HTTPS handshake. Today only Firefox supports ESNI through custom configuration. Suggested workaround is to disable this feature. Client Certification Authentication isn't supported Client certificates are used to bui...
[ 0.004020594526082277, -0.03249133378267288, 0.002958910306915641, 0.014467098750174046, 0.05042048543691635, -0.003949138801544905, 0.032844629138708115, 0.03514154255390167, -0.0032086584251374006, -0.05186999589204788, -0.01817336305975914, -0.00975236389786005, -0.07709282636642456, 0.0...
{ "azure_component": "security", "chunk_index": 632, "contains_sku": true, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "602", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure Firewall Premium features Learn more about Azure network security
[ 0.007929520681500435, -0.0008637083228677511, 0.04209059849381447, 0.06114821881055832, 0.062067970633506775, 0.01051719207316637, 0.06382057815790176, -0.008587866090238094, 0.016170630231499672, -0.039977844804525375, -0.02048533223569393, -0.010274653322994709, -0.02592715434730053, 0.0...
{ "azure_component": "security", "chunk_index": 633, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "603", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
az network firewall Manage and configure Azure Firewalls. Name Description Type Status az network firewall application- rule Manage and configure Azure Firewall application rules. Extension GA az network firewall application- rule collection Manage and configure Azure Firewall application rule collections. Extension GA...
[ -0.020086925476789474, 0.016176695004105568, -0.018967851996421814, -0.011092442087829113, 0.041014429181814194, -0.034483518451452255, 0.03720561042428017, 0.01969228871166706, 0.004419190809130669, -0.0309611763805151, -0.0882883220911026, 0.0330558605492115, -0.05978740006685257, 0.0371...
{ "azure_component": "security", "chunk_index": 634, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "604", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name Description Type Status az network firewall ip-config Manage and configure Azure Firewall IP configurations. Extension GA az network firewall ip-config create Create an Azure Firewall IP configuration. Extension GA az network firewall ip-config delete Delete an Azure Firewall IP configuration. Extension GA az netw...
[ -0.02705695666372776, -0.0014215477276593447, -0.031954143196344376, 0.011246314272284508, 0.06168544664978981, -0.0037844586186110973, 0.05302111431956291, 0.02323446236550808, 0.004736111033707857, -0.03717132657766342, -0.05913418531417847, 0.0066427490673959255, -0.0814991369843483, 0....
{ "azure_component": "security", "chunk_index": 635, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "605", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name Description Type Status az network firewall nat-rule list List Azure Firewall NAT rules. Extension GA az network firewall nat-rule show Get the details of an Azure Firewall NAT rule. Extension GA az network firewall network-rule Manage and configure Azure Firewall network rules. Extension GA az network firewall ne...
[ -0.030863823369145393, -0.02220536395907402, -0.01823071949183941, 0.004675190430134535, 0.041862137615680695, -0.024524929001927376, 0.056062713265419006, 0.015728311613202095, -0.0072107138112187386, -0.04130585119128227, -0.06192365661263466, 0.01694292016327381, -0.06622622907161713, 0...
{ "azure_component": "security", "chunk_index": 636, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "606", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name Description Type Status az network firewall policy draft intrusion-detection Manage intrusion signature rules and bypass rules. Extension GA az network firewall policy draft intrusion-detection add Update a draft Firewall Policy. Extension Preview az network firewall policy draft intrusion-detection list List all ...
[ -0.0185416080057621, -0.029747284948825836, 0.00971361342817545, -0.0037130892742425203, 0.06566356122493744, -0.007525658700615168, 0.03919572755694389, 0.012066381052136421, -0.03965574875473976, -0.06936611980199814, -0.03792446479201317, -0.006292400415986776, -0.0627361312508583, 0.01...
{ "azure_component": "security", "chunk_index": 637, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "607", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name Description Type Status az network firewall policy rule- collection-group collection add- nat-collection Add a NAT collection into an Azure firewall policy rule collection group. Extension Preview az network firewall policy rule- collection-group collection list List all rule collections of an Azure firewall polic...
[ -0.006914925761520863, -0.02127693220973015, -0.010944814421236515, -0.00454391585662961, 0.039673980325460434, -0.02832147106528282, 0.04166245460510254, -0.012293812818825245, -0.020160632207989693, -0.05205344408750534, -0.05618869513273239, 0.0014145663008093834, -0.078739233314991, 0....
{ "azure_component": "security", "chunk_index": 638, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "608", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name Description Type Status az network firewall policy rule- collection-group draft collection list List all rule collections of an Azure firewall policy rule collection group draft. Extension Preview az network firewall policy rule- collection-group draft collection remove Remove a rule collection from an Azure firew...
[ -0.003444477915763855, -0.01872742362320423, -0.010444472543895245, -0.01258386205881834, 0.05585673078894615, -0.018181942403316498, 0.024589937180280685, 0.008659842424094677, -0.03937637433409691, -0.06884255260229111, -0.05313405767083168, -0.008206907659769058, -0.06770790368318558, 0...
{ "azure_component": "security", "chunk_index": 639, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "609", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name Description Type Status az network firewall policy update Update an Azure firewall policy. Extension GA az network firewall policy wait Place the CLI in a waiting state until a condition is met. Extension GA az network firewall show Get the details of an Azure Firewall. Extension GA az network firewall threat-inte...
[ -0.02812659740447998, -0.03110527992248535, -0.031915176659822464, 0.022733980789780617, 0.0764908641576767, 0.013569870963692665, 0.026180081069469452, 0.010091661475598812, -0.01541049126535654, -0.056607749313116074, -0.06125076115131378, 0.014702375046908855, -0.07884291559457779, 0.02...
{ "azure_component": "security", "chunk_index": 640, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "610", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Create a Azure firewall with private ranges Azure CLI Create a Virtual WAN Secure Hub Firewall Azure CLI Create a Basic SKU Firewall with Management IP Configuration Azure CLI false, n, no, t, true, y, yes}] [--enable-pac-file {0, 1, f, false, n, no, t, true, y, yes}] ...
[ 0.028723377734422684, 0.014713715761899948, -0.00922753568738699, 0.04483210667967796, 0.04868489131331444, -0.003718332387506962, 0.06330594420433044, 0.010521001182496548, 0.014742875471711159, -0.035319890826940536, -0.03306131064891815, 0.005672526080161333, -0.070501409471035, 0.04310...
{ "azure_component": "security", "chunk_index": 641, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "611", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Create a Basic SKU Firewall with Virtual Hub Azure CLI --name -n Azure Firewall name. --resource-group -g Name of resource group. You can configure the default group using az configure -- defaults group=<name> . The following parameters are optional, but depending on the context, one or more might become required for t...
[ -0.009050837717950344, -0.0007353686378337443, 0.029347442090511322, 0.015662452206015587, 0.03600011765956879, -0.01839207299053669, 0.04280105605721474, 0.04549437388777733, 0.011100342497229576, -0.03292502090334892, -0.07618255168199539, -0.019061429426074028, -0.10001245141029358, 0.0...
{ "azure_component": "security", "chunk_index": 642, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "612", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Property Value Parameter group: Data Traffic IP Configuration Arguments --count --public-ip-count Number of Public IP Address associated with azure firewall. It's used to add public ip addresses into this firewall. Property Value Parameter group: Virtual Hub Public Ip Arguments --dns-servers Space-separated list of DNS...
[ -0.029813410714268684, -0.003056868212297559, 0.015768717974424362, -0.020282095298171043, 0.008010809309780598, 0.05188434571027756, 0.05399584770202637, -0.021390868350863457, -0.0057440465316176414, -0.055110134184360504, -0.05145251750946045, -0.0243405532091856, -0.08937167376279831, ...
{ "azure_component": "security", "chunk_index": 643, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "613", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
When set to true, explicit proxy mode is enabled. Property Value Parameter group: Explicit Proxy Arguments Accepted values: 0, 1, f, false, n, no, t, true, y, yes --enable-fat-flow-logging --fat-flow-logging Allow fat flow logging. By default it is false. Property Value Accepted values: 0, 1, f, false, n, no, t, true, ...
[ -0.017970426008105278, -0.024157637730240822, 0.01262118574231863, 0.0108379190787673, 0.0654388889670372, 0.006095085293054581, 0.05428889021277428, -0.015024685300886631, 0.017056124284863472, -0.06861263513565063, -0.02712610550224781, -0.00523368502035737, -0.059889622032642365, 0.0451...
{ "azure_component": "security", "chunk_index": 644, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "614", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
--http-port Port number for explicit proxy http protocol, cannot be greater than 64000. Property Value Parameter group: Explicit Proxy Arguments --https-port Port number for explicit proxy https protocol, cannot be greater than 64000. Property Value Parameter group: Explicit Proxy Arguments Accepted values: 0, 1, f, fa...
[ -0.02242552489042282, 0.013816026970744133, 0.003633213695138693, -0.013551615178585052, 0.03582637757062912, 0.006720882840454578, 0.04593033716082573, -0.025163689628243446, 0.007831051014363766, -0.06895002722740173, -0.018089428544044495, 0.0031715799123048782, -0.09968969225883484, 0....
{ "azure_component": "security", "chunk_index": 645, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "615", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Property Value Parameter group: Management IP Configuration Arguments --no-wait Do not wait for the long-running operation to finish. Property Value Accepted values: 0, 1, f, false, n, no, t, true, y, yes --pac-file SAS URL for PAC file. Property Value Parameter group: Explicit Proxy Arguments --pac-file-port Port numb...
[ -0.018454665318131447, 0.01109636202454567, -0.0006778298993594944, 0.027113638818264008, 0.024168044328689575, 0.019008850678801537, 0.060343001037836075, -0.017943350598216057, -0.005162905436009169, -0.07319562882184982, -0.034997157752513885, -0.015378343872725964, -0.054966963827610016,...
{ "azure_component": "security", "chunk_index": 646, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "616", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Property Value Parameter group: Data Traffic IP Configuration Arguments --route-server-id The Route Server Id for the firewall. --sku SKU of Azure firewall. This field cannot be updated after the creation. The default sku in server end is AZFW_VNet. If you want to attach azure firewall to vhub, you should set sku to AZ...
[ 0.018428875133395195, -0.014995064586400986, 0.005216206423938274, 0.03243539482355118, 0.0384858064353466, 0.002394246170297265, 0.056093983352184296, 0.04450253024697304, 0.027415256947278976, -0.05766339227557182, -0.034739505499601364, -0.03676214441657066, -0.09716018289327621, 0.0371...
{ "azure_component": "security", "chunk_index": 647, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "617", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Property Value Default value: Standard Accepted values: Basic, Premium, Standard --vhub --virtual-hub Name or ID of the virtualHub to which the firewall belongs. --vnet-name The virtual network (VNet) name. It should contain one subnet called "AzureFirewallSubnet". Property Value Parameter group: Data Traffic IP Config...
[ 0.008359176106750965, -0.0053535280749201775, 0.050682585686445236, 0.01618088223040104, 0.05605321377515793, 0.0138307586312294, 0.07549549639225006, 0.0013012370327487588, 0.012488611973822117, -0.058724697679281235, -0.04885222017765045, -0.020577657967805862, -0.09356387704610825, 0.00...
{ "azure_component": "security", "chunk_index": 648, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "618", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Only show errors, suppressing warnings. Property Value Default value: False --output -o Output format. Property Value Default value: json Accepted values: json, jsonc, none, table, tsv, yaml, yamlc --query JMESPath query string. See http://jmespath.org/ for more information and examples. --subscription Name or ID of s...
[ -0.018357830122113228, 0.012156394310295582, 0.0012167413951829076, 0.001995349768549204, 0.07585234940052032, 0.011612731963396072, 0.08030777424573898, 0.0288982130587101, -0.00017965014558285475, -0.05413651838898659, -0.04142908379435539, 0.02612885646522045, -0.10228683054447174, 0.03...
{ "azure_component": "security", "chunk_index": 649, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "619", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Azure CLI The following parameters are optional, but depending on the context, one or more might become required for the command to execute successfully. --ids One or more resource IDs (space-delimited). It should be a complete resource ID containing all information of 'Resource Id' arguments. You should provide either...
[ -0.03163762390613556, 0.018461396917700768, -0.014904827810823917, 0.018427133560180664, 0.05842001363635063, 0.04067734628915787, 0.040316492319107056, -0.011922395788133144, 0.005570709239691496, -0.06139654666185379, -0.04776393994688988, 0.02882854826748371, -0.072331503033638, 0.03570...
{ "azure_component": "security", "chunk_index": 650, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "620", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
--resource-group -g Name of resource group. You can configure the default group using az configure -- defaults group=<name> . Property Value Parameter group: Resource Id Arguments --subscription Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID . Property Value Pa...
[ -0.02523292787373066, 0.02350686490535736, 0.035212140530347824, 0.0031495639123022556, 0.031975094228982925, 0.018786966800689697, 0.06133833900094032, -0.003281546290963888, -0.00009719474473968148, -0.05800534784793854, -0.05027490109205246, 0.011292721144855022, -0.07848497480154037, 0...
{ "azure_component": "security", "chunk_index": 651, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "621", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Property Value Default value: False --output -o Output format. Property Value Default value: json Accepted values: json, jsonc, none, table, tsv, yaml, yamlc --query JMESPath query string. See http://jmespath.org/ for more information and examples. --verbose Increase logging verbosity. Use --debug for full debug logs....
[ -0.023062653839588165, -0.0032637757249176502, 0.0022660144604742527, 0.020320888608694077, 0.07092339545488358, 0.0005898675881326199, 0.06449605524539948, 0.05049636587500572, -0.013288941234350204, -0.07121825963258743, -0.038668710738420486, 0.020350635051727295, -0.0884377583861351, 0...
{ "azure_component": "security", "chunk_index": 652, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "622", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
List Learned IP Prefixes Azure CLI The following parameters are optional, but depending on the context, one or more might become required for the command to execute successfully. --ids One or more resource IDs (space-delimited). It should be a complete resource ID containing all information of 'Resource Id' arguments. ...
[ -0.020308012142777443, 0.012590086087584496, -0.032162174582481384, 0.03010491281747818, 0.05718335509300232, 0.0445098951458931, 0.04387551546096802, -0.006494863424450159, -0.007407728116959333, -0.04615641012787819, -0.025919971987605095, 0.026232818141579628, -0.06311049312353134, 0.00...
{ "azure_component": "security", "chunk_index": 653, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "623", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
--no-wait Do not wait for the long-running operation to finish. Property Value Accepted values: 0, 1, f, false, n, no, t, true, y, yes --resource-group -g Name of resource group. You can configure the default group using az configure -- defaults group=<name> . Property Value Parameter group: Resource Id Arguments --sub...
[ -0.025993922725319862, -0.0020695305429399014, 0.01773737370967865, 0.00932998489588499, 0.05089365318417549, 0.025049706920981407, 0.05076313763856888, 0.023354677483439445, -0.015560370869934559, -0.06919162720441818, -0.04865485057234764, 0.017590686678886414, -0.06241690367460251, 0.02...
{ "azure_component": "security", "chunk_index": 654, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "624", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
--help -h Show this help message and exit. --only-show-errors Only show errors, suppressing warnings. Property Value Default value: False --output -o Output format. Property Value Default value: json Accepted values: json, jsonc, none, table, tsv, yaml, yamlc --query JMESPath query string. See http://jmespath.org/ for...
[ -0.01408267393708229, 0.027972588315606117, -0.002838917076587677, 0.006797960493713617, 0.04471370205283165, -0.01940050721168518, 0.07494919747114182, 0.022502364590764046, -0.027247551828622818, -0.07024866342544556, -0.054983120411634445, 0.019167641177773476, -0.09833177179098129, 0.0...
{ "azure_component": "security", "chunk_index": 655, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "625", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
List Azure Firewalls. Azure CLI The following parameters are optional, but depending on the context, one or more might become required for the command to execute successfully. --max-items Total number of items to return in the command's output. If the total number of items available is more than the value specified, a ...
[ -0.04699241742491722, -0.02667419984936714, -0.027362527325749397, 0.02396082878112793, 0.03871394321322441, 0.017820430919528008, 0.033174920827150345, 0.02388347126543522, -0.017058568075299263, -0.06095520406961441, -0.08141820877790451, -0.014757335186004639, -0.051608581095933914, 0.0...
{ "azure_component": "security", "chunk_index": 656, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "626", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
--debug Increase logging verbosity to show all debug logs. Property Value Default value: False --help -h Show this help message and exit. --only-show-errors Only show errors, suppressing warnings. Property Value Default value: False --output -o Output format. Property Value Default value: json Accepted values: json, js...
[ -0.012674662284553051, 0.013538607396185398, -0.007749040611088276, 0.01207064464688301, 0.054564666002988815, 0.003805051324889064, 0.08984516561031342, 0.009528996422886848, -0.032559141516685486, -0.08245861530303955, -0.023623576387763023, 0.004634476266801357, -0.11277681589126587, 0....
{ "azure_component": "security", "chunk_index": 657, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "627", "source_file": "Azure Firewall.pdf", "total_pages": 717 }
Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID . --verbose Increase logging verbosity. Use --debug for full debug logs. Property Value Default value: False Gets all the Azure Firewall FQDN Tags in a subscription. Azure CLI The following parameters are optional,...
[ -0.04133711755275726, -0.024644196033477783, -0.0026812199503183365, 0.012677345424890518, 0.06352333724498749, 0.01639997959136963, 0.04381786659359932, 0.02385868690907955, 0.013168536126613617, -0.03979530930519104, -0.07462924718856812, 0.015305493026971817, -0.08539841324090958, 0.011...
{ "azure_component": "security", "chunk_index": 658, "contains_sku": false, "document_title": "Azure Firewall", "file_path": "./azure_docs\\Azure Firewall.pdf", "is_summary": false, "service_name": "Azure Firewall", "source": "628", "source_file": "Azure Firewall.pdf", "total_pages": 717 }