Skip to content

Commit 1dd316c

Browse files
Merge pull request #204923 from greg-lindsay/policy-analytics
Firewall: Policy Analytics preview
2 parents 3bec7f7 + 37327be commit 1dd316c

File tree

3 files changed

+57
-4
lines changed

3 files changed

+57
-4
lines changed

articles/firewall/firewall-preview.md

Lines changed: 57 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 07/08/2022
8+
ms.date: 07/15/2022
99
ms.author: victorh
1010
---
1111

@@ -97,13 +97,66 @@ By default, the new resource specific tables are disabled. Open a support ticket
9797

9898
In addition, when setting up your log analytics workspace, you must select whether you want to work with the AzureDiagnostics table (default) or with Resource Specific Tables.
9999

100-
Additional KQL log queries were added (as seen in the following screenshot) to query structured firewall logs.
101-
102-
:::image type="content" source="media/firewall-preview/resource-specific-tables.png" alt-text="Screenshot showing Firewall logs Resource Specific Tables." lightbox="media/firewall-preview/resource-specific-tables-zoom.png":::
100+
Additional KQL log queries were added to query structured firewall logs.
103101

104102
> [!NOTE]
105103
> Existing Workbooks and any Sentinel integration will be adjusted to support the new structured logs when **Resource Specific** mode is selected.
106104
105+
### Policy Analytics (preview)
106+
107+
Policy Analytics provides insights, centralized visibility, and control to Azure Firewall. IT teams today are challenged to keep Firewall rules up to date, manage existing rules, and remove unused rules. Any accidental rule updates can lead to a significant downtime for IT teams.
108+
109+
For large, geographically dispersed organizations, manually managing Firewall rules and policies is a complex and sometimes error-prone process. The new Policy Analytics feature is the answer to this common challenge faced by IT teams.
110+
111+
You can now refine and update Firewall rules and policies with confidence in just a few steps in the Azure portal. You have granular control to define your own custom rules for an enhanced security and compliance posture. You can automate rule and policy management to reduce the risks associated with a manual process.
112+
113+
#### Pricing
114+
115+
Enabling Policy Analytics on a Firewall Policy associated with a single firewall is billed per policy as described on the [Azure Firewall Manager pricing](https://azure.microsoft.com/pricing/details/firewall-manager/) page. Enabling Policy Analytics on a Firewall Policy associated with more than one firewall is offered at no additional cost.
116+
117+
#### Key Policy Analytics features
118+
119+
- **Policy insight panel**: Aggregates insights and highlights relevant policy information.
120+
- **Rule analytics**: Analyzes existing DNAT, Network, and Application rules to identify rules with low utilization or rules with low usage in a specific time window.
121+
- **Traffic flow analysis**: Maps traffic flow to rules by identifying top traffic flows and enabling an integrated experience.
122+
- **Single Rule analysis**: Analyzes a single rule to learn what traffic hits that rule to refine the access it provides and improve the overall security posture.
123+
124+
### Prerequisites
125+
126+
- An Azure Firewall Standard or Premium
127+
- An Azure Firewall Standard or Premium policy attached to the Firewall
128+
- The [network rule name logging preview feature](#network-rule-name-logging-preview) must be enabled to view network rules analysis
129+
- The [structured firewall logs feature](#structured-firewall-logs-preview) must be enabled on Firewall Standard or Premium
130+
131+
132+
### Enable Policy Analytics
133+
134+
#### Firewall with no Azure Diagnostics settings configured
135+
136+
137+
1. Once all prerequisites are met, select **Policy analytics (preview)** in the table of contents.
138+
2. Next, select **Configure Workspaces**.
139+
3. In the pane that opens, select the **Enable Policy Analytics** checkbox.
140+
4. Next, choose a log analytics workspace. The log analytics workspace should be the same as the Firewall attached to the policy.
141+
5. Select **Save** after you choose the log analytics workspace.
142+
6. Go to the Firewall attached to the policy and enter the **Diagnostic settings** page. You'll see the **FirewallPolicySetting** added there as part of the policy analytics feature.
143+
7. Select **Edit Setting**, and ensure the **Resource specific** toggle is checked, and the highlighted tables are checked. In the previous example, all logs are written to the log analytics workspace.
144+
145+
#### Firewall with Azure Diagnostics settings already configured
146+
147+
1. Ensure that the Firewall attached to the policy is connected to **Resource Specific** tables, and that the following three tables are enabled:
148+
- AZFWApplicationRuleAggregation
149+
- AZFWNetworkRuleAggregation
150+
- AZFWNatRuleAggregation
151+
2. Next, select **Policy Analytics (preview)** in the table of contents. Once inside the feature, select **Configure Workspaces**.
152+
3. Now, select **Enable Policy Analytics**.
153+
4. Next, choose a log analytics workspace. The log analytics workspace should be the same as the Firewall attached to the policy.
154+
5. Select **Save** after you choose the log analytics workspace.
155+
156+
During the save process, you might see the following error message: **Failed to update Diagnostic Settings**
157+
158+
You can disregard this error message if the policy was successfully updated.
159+
107160
## Next steps
108161

109162
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).
Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)