Skip to content

Commit 1c5780a

Browse files
committed
Moved the supported ports table to the end
1 parent 88306b1 commit 1c5780a

File tree

1 file changed

+69
-73
lines changed

1 file changed

+69
-73
lines changed

articles/security-center/security-center-adaptive-network-hardening.md

Lines changed: 69 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -26,76 +26,11 @@ Adaptive Network Hardening provides recommendations to further harden the NSG ru
2626

2727
For example, let's say the existing NSG rule is to allow traffic from 140.20.30.10/24 on port 22. The Adaptive Network Hardening's recommendation, based on the analysis, would be to narrow the range and allow traffic from 140.23.30.10/29 – which is a narrower IP range, and deny all other traffic to that port.
2828

29-
![network hardening view](./media/security-center-adaptive-network-hardening/traffic-hardening.png)
29+
>[!TIP]
30+
> Adaptive Network Hardening recommendations are only supported on specific ports. For the full list, see [#which-ports-are-supported](Which ports are supported?) below.
3031
3132

32-
## Which ports are supported?
33-
34-
Adaptive Network Hardening recommendations are only supported on specific ports. This table gives you the full list:
35-
36-
|Port|Protocol|Associated Service|
37-
|:---:|:----:|:----|
38-
|13|UDP|Daytime service|
39-
|17|UDP|QOTD protocol|
40-
|19|UDP|CHARGEN protocol|
41-
|22|TCP|SSH|
42-
|23|TCP|Telnet|
43-
|53|UDP|DNS|
44-
|69|UDP|TFTP|
45-
|81|TCP|Potentially malicious (TOR exit node)|
46-
|111|TCP/UDP|RPC|
47-
|119|TCP|NNTP|
48-
|123|UDP|NTP|
49-
|135|TCP/UDP|Endpoint Mapper; RPC; DCE|
50-
|137|TCP/UDP|NetBIOS Name Service|
51-
|138|TCP/UDP|NetBIOS Datagram Service|
52-
|139|TCP|NetBIOS Session Service|
53-
|161|TCP/UDP|SNMP|
54-
|162|TCP/UDP|SNMP|
55-
|389|TCP|LDAP|
56-
|445|TCP|SMB|
57-
|512|TCP|Rexec|
58-
|514|TCP|Remote shell|
59-
|593|TCP/UDP|HTTP RPC|
60-
|636|TCP|LDAP|
61-
|873|TCP|Rsync|
62-
|1433|TCP|MS SQL|
63-
|1434|UDP|MS SQL|
64-
|1900|UDP|SSDP|
65-
|1900|UDP|SSDP|
66-
|2049|TCP/UDP|NFS|
67-
|2301|TCP|Compaq management service|
68-
|2323|TCP|3d-nfsd|
69-
|2381|TCP|Compaq management service|
70-
|3268|TCP|LDAP|
71-
|3306|TCP|MySQL|
72-
|3389|TCP|RDP|
73-
|4333|TCP|mSQL|
74-
|5353|UDP|mDNS|
75-
|5432|TCP|PostgreSQL|
76-
|5555|TCP|Personal Agent; HP OmniBack|
77-
|5800|TCP|VNC|
78-
|5900|TCP|Remote framebuffer; VNC|
79-
|5900|TCP|VNC|
80-
|5985|TCP|Windows PowerShell|
81-
|5986|TCP|Windows PowerShell|
82-
|6379|TCP|Redis|
83-
|6379|TCP|Redis|
84-
|7000|TCP|Cassandra|
85-
|7001|TCP|Cassandra|
86-
|7199|TCP|Cassandra|
87-
|8081|TCP|CosmosDB; Sun Proxy Admin|
88-
|8089|TCP|Splunk|
89-
|8545|TCP|Potentially malicious (Cryptominer)|
90-
|9042|TCP|Cassandra|
91-
|9160|TCP|Cassandra|
92-
|9300|TCP|Elasticsearch|
93-
|11211|UDP|Memcached|
94-
|16379|TCP|Redis|
95-
|26379|TCP|Redis|
96-
|27017|TCP|MongoDB|
97-
|37215|TCP|Potentially malicious|
98-
||||
33+
![Network hardening view](./media/security-center-adaptive-network-hardening/traffic-hardening.png)
9934

10035

10136
## View Adaptive Network Hardening alerts and rules
@@ -202,11 +137,72 @@ When necessary, you can delete a recommended rule for the current session. For e
202137

203138
![hardening rules](./media/security-center-adaptive-network-hardening/delete-hard-rule.png)
204139

140+
205141

142+
## Which ports are supported?
206143

144+
Adaptive Network Hardening recommendations are only supported on specific ports. This table gives you the full list:
207145

208-
209-
210-
211-
212-
146+
|Port|Protocol|Associated Service|
147+
|:---:|:----:|:----|
148+
|13|UDP|Daytime service|
149+
|17|UDP|QOTD protocol|
150+
|19|UDP|CHARGEN protocol|
151+
|22|TCP|SSH|
152+
|23|TCP|Telnet|
153+
|53|UDP|DNS|
154+
|69|UDP|TFTP|
155+
|81|TCP|Potentially malicious (TOR exit node)|
156+
|111|TCP/UDP|RPC|
157+
|119|TCP|NNTP|
158+
|123|UDP|NTP|
159+
|135|TCP/UDP|Endpoint Mapper; RPC; DCE|
160+
|137|TCP/UDP|NetBIOS Name Service|
161+
|138|TCP/UDP|NetBIOS Datagram Service|
162+
|139|TCP|NetBIOS Session Service|
163+
|161|TCP/UDP|SNMP|
164+
|162|TCP/UDP|SNMP|
165+
|389|TCP|LDAP|
166+
|445|TCP|SMB|
167+
|512|TCP|Rexec|
168+
|514|TCP|Remote shell|
169+
|593|TCP/UDP|HTTP RPC|
170+
|636|TCP|LDAP|
171+
|873|TCP|Rsync|
172+
|1433|TCP|MS SQL|
173+
|1434|UDP|MS SQL|
174+
|1900|UDP|SSDP|
175+
|1900|UDP|SSDP|
176+
|2049|TCP/UDP|NFS|
177+
|2301|TCP|Compaq management service|
178+
|2323|TCP|3d-nfsd|
179+
|2381|TCP|Compaq management service|
180+
|3268|TCP|LDAP|
181+
|3306|TCP|MySQL|
182+
|3389|TCP|RDP|
183+
|4333|TCP|mSQL|
184+
|5353|UDP|mDNS|
185+
|5432|TCP|PostgreSQL|
186+
|5555|TCP|Personal Agent; HP OmniBack|
187+
|5800|TCP|VNC|
188+
|5900|TCP|Remote framebuffer; VNC|
189+
|5900|TCP|VNC|
190+
|5985|TCP|Windows PowerShell|
191+
|5986|TCP|Windows PowerShell|
192+
|6379|TCP|Redis|
193+
|6379|TCP|Redis|
194+
|7000|TCP|Cassandra|
195+
|7001|TCP|Cassandra|
196+
|7199|TCP|Cassandra|
197+
|8081|TCP|CosmosDB; Sun Proxy Admin|
198+
|8089|TCP|Splunk|
199+
|8545|TCP|Potentially malicious (Cryptominer)|
200+
|9042|TCP|Cassandra|
201+
|9160|TCP|Cassandra|
202+
|9300|TCP|Elasticsearch|
203+
|11211|UDP|Memcached|
204+
|16379|TCP|Redis|
205+
|26379|TCP|Redis|
206+
|27017|TCP|MongoDB|
207+
|37215|TCP|Potentially malicious|
208+
||||

0 commit comments

Comments
 (0)