Skip to content

Commit 14347ed

Browse files
authored
Updates from PM Reviews
1 parent c83d575 commit 14347ed

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/security/fundamentals/overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -201,15 +201,15 @@ Azure networking supports various secure remote access scenarios. Some of these
201201

202202
### Azure Virtual Network Manager
203203

204-
[Azure Virtual Network Manager](../../virtual-network-manager/overview.md) provides a centralized solution for protecting your virtual networks at scale. It uses [Security Admin Rules](../../virtual-network-manager/concept-security-admins.md) to centrally define and enforce security policies for your virtual networks across your entire organization. Security admin rules takes precedence over Network Security Group (NSG) rules. This allows organizations to enforce core security policies while still enabling application teams to tailor NSGs according to their specific needs at the application group level. Depending on the needs of your organization, you can use **Allow**, **Deny**, or **Always Allow** rule actions to enforce security policies.
204+
[Azure Virtual Network Manager](../../virtual-network-manager/overview.md) provides a centralized solution for protecting your virtual networks at scale. It uses [security admin rules](../../virtual-network-manager/concept-security-admins.md) to centrally define and enforce security policies for your virtual networks across your entire organization. Security admin rules takes precedence over network security group(NSGs) rules and are applied on the virtual network. This allows organizations to enforce core policies with security admin rules, while still enabling downstream teams to tailor NSGs according to their specific needs at the subnet and NIC levels. Depending on the needs of your organization, you can use **Allow**, **Deny**, or **Always Allow** rule actions to enforce security policies.
205205

206206
| Rule Action | Description |
207207
|-------------|-------------|
208-
| **Allow** | Allow the traffic trusted boundary by default unless denied by NSGs created by individual teams. |
209-
| **Always allow** | Always allow monitoring agent's traffic.</br>Always allow domain controller traffic.</br>Always allow management traffic.|
210-
| **Deny** | Protect high-risk ports by default for all exiting and new VNets. |
208+
| **Allow** | Allows the specified traffic by default. Downstream NSGs still receive this traffic and may deny it.|
209+
| **Always Allow** | Always allow the specified traffic, regardless of other rules with lower priority or NSGs. This can be used to ensure that monitoring agent, domain controller, or management traffic is not blocked. |
210+
| **Deny** | Block the specified traffic. Downstream NSGs will not evaluate this traffic after being denied by a security admin rule, ensuring your high-risk ports for existing and new virtual networks are protected by default. |
211211

212-
In Azure Virtual Network Manager, [Network groups](../../virtual-network-manager/concept-network-groups.md) allow you to group virtual networks together for centralized management and enforcement of security policies. Network groups are a logical grouping of virtual networks based on your needs from a topology and security perspective. You can manually create network groups or use [dynamic network groups with Azure Policy](../../virtual-network-manager/concept-azure-policy-integration.md).
212+
In Azure Virtual Network Manager, [network groups](../../virtual-network-manager/concept-network-groups.md) allow you to group virtual networks together for centralized management and enforcement of security policies. Network groups are a logical grouping of virtual networks based on your needs from a topology and security perspective. You can manually update the virtual network membership of your network groups or you can [define conditional statements with Azure Policy](../../virtual-network-manager/concept-azure-policy-integration.md)to dynamically update network groups to automatically update your network group membership.
213213

214214
### Azure Private Link
215215

0 commit comments

Comments
 (0)