Skip to content

Commit 18203e6

Browse files
authored
Merge pull request #178747 from vhorne/fw-threat
Updates from Gopi
2 parents 37f33bb + 602be75 commit 18203e6

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/firewall/premium-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: conceptual
8-
ms.date: 10/29/2021
8+
ms.date: 11/04/2021
99
ms.author: victorh
1010
ms.custom: references_regions
1111
---
@@ -46,8 +46,8 @@ Azure Firewall Premium provides signature-based IDPS to allow rapid detection of
4646

4747
The Azure Firewall signatures/rulesets include:
4848
- An emphasis on fingerprinting actual malware, Command and Control, exploit kits, and in the wild malicious activity missed by traditional prevention methods.
49-
- Over 55,000 rules in over 50 categories.
50-
- The categories include malware command and control, DoS attacks, botnets, informational events, exploits, vulnerabilities, SCADA network protocols, exploit kit activity, and more.
49+
- Over 58,000 rules in over 50 categories.
50+
- The categories include malware command and control, phishing, trojans, botnets, informational events, exploits, vulnerabilities, SCADA network protocols, exploit kit activity, and more.
5151
- 20 to 40+ new rules are released each day.
5252
- Low false positive rating by using state-of-the-art malware sandbox and global sensor network feedback loop.
5353

articles/firewall/threat-intel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 05/12/2020
8+
ms.date: 11/04/2021
99
ms.author: victorh
1010
---
1111

1212
# Azure Firewall threat intelligence-based filtering
1313

14-
Threat intelligence-based filtering can be enabled for your firewall to alert and deny traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed. [Intelligent Security Graph](https://www.microsoft.com/security/operations/intelligence) powers Microsoft threat intelligence and is used by multiple services including Azure Security Center.<br>
14+
Threat intelligence-based filtering can be enabled for your firewall to alert and deny traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed, which includes multiple sources including the Microsoft Cyber Security team. [Intelligent Security Graph](https://www.microsoft.com/security/operations/intelligence) powers Microsoft threat intelligence and is used by multiple services including Azure Security Center.<br>
1515
<br>
1616

1717
:::image type="content" source="media/threat-intel/firewall-threat.png" alt-text="Firewall threat intelligence" border="false":::

0 commit comments

Comments
 (0)