Skip to content

Commit 2633f71

Browse files
committed
delete images from articles.
1 parent 54bc588 commit 2633f71

15 files changed

+36
-81
lines changed

articles/firewall/dns-settings.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,6 @@ A DNS server maintains and resolves domain names to IP addresses. By default, Az
3131

3232
The firewall now directs DNS traffic to the specified DNS servers for name resolution.
3333

34-
:::image type="content" source="../firewall/media/dns-settings/dns-servers.png" alt-text="Screenshot showing settings for DNS servers.":::
35-
3634
#### [CLI](#tab/azure-devops-cli)
3735

3836
The following example updates Azure Firewall with custom DNS servers by using the Azure CLI.

articles/firewall/explicit-proxy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,6 @@ With the Explicit proxy mode (supported for HTTP/S), you can define proxy settin
3737

3838
- To use the Proxy autoconfiguration (PAC) file, select **Enable proxy auto-configuration**.
3939

40-
:::image type="content" source="media/explicit-proxy/proxy-auto-configuration.png" alt-text="Screenshot showing the proxy autoconfiguration file setting.":::
41-
4240
- First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy** page, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
4341

4442
The SAS URL must have READ permissions so the firewall can download the file. If changes are made to the PAC file, a new SAS URL needs to be generated and configured on the firewall **Enable explicit proxy** page.

articles/firewall/firewall-azure-policy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,8 +108,6 @@ Now you attempt to create a Firewall Policy with Threat Intelligence disabled.
108108

109109
You should see an error that says your resource was disallowed by policy, confirming that your Azure Policy doesn't allow firewall policies that have Threat Intelligence disabled.
110110

111-
:::image type="content" source="media/firewall-azure-policy/azure-policy.png" lightbox="media/firewall-azure-policy/azure-policy.png" alt-text="Screenshot showing policy create denial.":::
112-
113111
## Related content
114112

115113
- [What is Azure Policy?](../governance/policy/overview.md)

articles/firewall/firewall-copilot.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -96,8 +96,6 @@ Get **log information** about the traffic intercepted by the IDPS feature instea
9696
- What are the top 20 IDPS hits from the last seven days for Firewall _\<Firewall name\>_ in resource group _\<resource group name\>_?
9797
- Show me in tabular form the top 50 attacks that targeted Firewall _\<Firewall name\>_ in subscription _\<subscription name\>_ in the past month.
9898

99-
:::image type="content" source="media/firewall-copilot/copilot-capability-1-embedded.png" alt-text="Screenshot showing the Retrieve the top IDPS signature hits for an Azure Firewall capability." lightbox="media/firewall-copilot/copilot-capability-1-embedded.png":::
100-
10199
### Enrich the threat profile of an IDPS signature beyond log information
102100

103101
Get **additional details** to enrich the threat information/profile of an IDPS signature instead of compiling it yourself manually.
@@ -108,8 +106,6 @@ Get **additional details** to enrich the threat information/profile of an IDPS s
108106
- What can you tell me about this attack? What are the other attacks this attacker is known for?
109107
- I see that the third signature ID is associated with CVE _\<CVE number\>_, tell me more about this CVE.
110108

111-
:::image type="content" source="media/firewall-copilot/copilot-capability-2-embedded.png" alt-text="Screenshot showing the Enrich the threat profile of an IDPS signature beyond log information capability." lightbox="media/firewall-copilot/copilot-capability-2-embedded.png":::
112-
113109
> [!NOTE]
114110
> The Microsoft Threat Intelligence plugin is another source that Security Copilot may use to provide threat intelligence for IDPS signatures.
115111
@@ -123,8 +119,6 @@ Perform a **fleet-wide search** (over any scope) for a threat across all your Fi
123119
- Was the top hit seen by any other Firewall in the subscription _\<subscription name\>_?
124120
- Over the past week did any Firewall in resource group _\<resource group name\>_ see signature ID _\<ID number\>_?
125121

126-
:::image type="content" source="media/firewall-copilot/copilot-capability-3-embedded.png" alt-text="Screenshot showing the Look for a given IDPS signature across your tenant, subscription, or resource group capability." lightbox="media/firewall-copilot/copilot-capability-3-embedded.png":::
127-
128122
### Generate recommendations to secure your environment using Azure Firewall's IDPS feature
129123

130124
Get **information from documentation** about using Azure Firewall's IDPS feature to secure your environment instead of having to look up this information manually.

articles/firewall/ip-groups.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: vhorne
66
ms.service: azure-firewall
77
ms.custom: devx-track-azurepowershell
88
ms.topic: concept-article
9-
ms.date: 10/10/2023
9+
ms.date: 02/10/2025
1010
ms.author: victorh
1111
---
1212

@@ -37,18 +37,17 @@ An IP Group can be created using the Azure portal, Azure CLI, or REST API. For m
3737

3838
## Browse IP Groups
3939
1. In the Azure portal search bar, type **IP Groups** and select it. You can see the list of the IP Groups, or you can select **Add** to create a new IP Group.
40-
2. Select an IP Group to open the overview page. You can edit, add, or delete IP addresses or IP Groups.
40+
1. Select an IP Group to open the overview page. You can edit, add, or delete IP addresses or IP Groups.
4141

42-
![IP Groups overview](media/ip-groups/overview.png)
4342

4443
## Manage an IP Group
4544

4645
You can see all the IP addresses in the IP Group and the rules or resources that are associated with it. To delete an IP Group, you must first dissociate the IP Group from the resource that is using it.
4746

4847
1. To view or edit the IP addresses, select **IP Addresses** under **Settings** on the left pane.
49-
2. To add a single or multiple IP address(es), select **Add IP Addresses**. This opens the **Drag or Browse** page for an upload, or you can enter the address manually.
50-
3. Selecting the ellipses (****) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
51-
4. Finally, can export the file in the CSV file format.
48+
1. To add a single or multiple IP address(es), select **Add IP Addresses**. This opens the **Drag or Browse** page for an upload, or you can enter the address manually.
49+
1. Selecting the ellipses (****) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
50+
1. Finally, can export the file in the CSV file format.
5251

5352
> [!NOTE]
5453
> If you delete all the IP addresses in an IP Group while it is still in use in a rule, that rule is skipped.
@@ -58,8 +57,6 @@ You can see all the IP addresses in the IP Group and the rules or resources that
5857

5958
You can now select **IP Group** as a **Source type** or **Destination type** for the IP address(es) when you create Azure Firewall DNAT, application, or network rules.
6059

61-
![IP Groups in Firewall](media/ip-groups/fw-ipgroup.png)
62-
6360
## Parallel IP Group updates (preview)
6461

6562
You can now update multiple IP Groups in parallel at the same time. This is particularly useful for administrators who want to make configuration changes more quickly and at scale, especially when making those changes using a dev ops approach (templates, ARM, CLI, and Azure PowerShell).
@@ -92,10 +89,8 @@ It can take several minutes for this to take effect. Once the feature is complet
9289
### Azure portal
9390

9491
1. Navigate to **Preview features** in the Azure portal.
95-
2. Search and register **AzureFirewallParallelIPGroupUpdate**.
96-
3. Ensure the feature is enabled.
97-
98-
:::image type="content" source="media/ip-groups/preview-features-parallel.png" alt-text="Screenshot showing the parallel IP groups feature.":::
92+
1. Search and register **AzureFirewallParallelIPGroupUpdate**.
93+
1. Ensure the feature is enabled.
9994

10095
## Region availability
10196

articles/firewall/premium-deploy-certificates-enterprise-ca.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -54,31 +54,33 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
5454
1. Submit the request and install the certificate.
5555
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.
5656
1. Navigate to the **Content** tab and select **Certificates**.
57-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/internet-properties.png" alt-text="Screenshot of Internet properties":::
57+
5858
1. Select the certificate that was just issued and then select **Export**.
59-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/export-certificate.png" alt-text="Screenshot of export certificate":::
59+
6060
1. Select **Next** to begin the wizard. Select **Yes, export the private key**, and then select **Next**.
61-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/export-private-key.png" alt-text="Screenshot showing export private key":::
61+
6262
1. .pfx file format is selected by default. Uncheck **Include all certificates in the certification path if possible**. If you export the entire certificate chain, the import process to Azure Firewall will fail.
63-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/export-file-format.png" alt-text="Screenshot showing export file format":::
63+
6464
1. Assign and confirm a password to protect the key, and then select **Next**.
65-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/certificate-security.png" alt-text="Screenshot showing certificate security":::
65+
6666
1. Choose a file name and export location and then select **Next**.
67+
6768
1. Select **Finish** and move the exported certificate to a secure location.
6869

6970
## Add the certificate to a Firewall Policy
7071

7172
1. In the Azure portal, navigate to the Certificates page of your Key Vault, and select **Generate/Import**.
73+
7274
1. Select **Import** as the method of creation, name the certificate, select the exported .pfx file, enter the password, and then select **Create**.
73-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/create-a-certificate.png" alt-text="Screenshot showing Key Vault create a certificate":::
75+
7476
1. Navigate to the **TLS Inspection** page of your Firewall policy and select your Managed identity, Key Vault, and certificate.
75-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/tls-inspection-certificate.png" alt-text="Screenshot showing Firewall Policy TLS Inspection configuration":::
77+
7678
1. Select **Save**.
7779

7880
## Validate TLS inspection
7981

8082
1. Create an Application Rule using TLS inspection to the destination URL or FQDN of your choice. For example: `*bing.com`.
81-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/edit-rule-collection.png" alt-text="Screenshot showing edit rule collection":::
83+
8284
1. From a domain-joined machine within the Source range of the rule, navigate to your Destination and select the lock symbol next to the address bar in your browser. The certificate should show that it was issued by your Enterprise CA rather than a public CA.
8385
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/browser-certificate.png" alt-text="Screenshot showing the browser certificate":::
8486
1. Show the certificate to display more details, including the certificate path.

articles/firewall/premium-deploy.md

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: azure-firewall
66
services: firewall
77
ms.topic: how-to
8-
ms.date: 02/28/2022
8+
ms.date: 02/10/2025
99
ms.author: victorh
1010
---
1111

@@ -62,11 +62,11 @@ Now you can test IDPS, TLS Inspection, Web filtering, and Web categories.
6262
To collect firewall logs, you need to add diagnostics settings to collect firewall logs.
6363

6464
1. Select the **DemoFirewall** and under **Monitoring**, select **Diagnostic settings**.
65-
2. Select **Add diagnostic setting**.
66-
3. For **Diagnostic setting name**, type *fw-diag*.
67-
4. Under **log**, select **AzureFirewallApplicationRule**, and **AzureFirewallNetworkRule**.
68-
5. Under **Destination details**, select **Send to Log Analytics workspace**.
69-
6. Select **Save**.
65+
1. Select **Add diagnostic setting**.
66+
1. For **Diagnostic setting name**, type *fw-diag*.
67+
1. Under **log**, select **AzureFirewallApplicationRule**, and **AzureFirewallNetworkRule**.
68+
1. Under **Destination details**, select **Send to Log Analytics workspace**.
69+
1. Select **Save**.
7070

7171
### IDPS tests
7272

@@ -77,11 +77,11 @@ You can use `curl` to control various HTTP headers and simulate malicious traffi
7777
#### To test IDPS for HTTP traffic:
7878

7979
1. On the WorkerVM virtual machine, open an administrator command prompt window.
80-
2. Type the following command at the command prompt:
80+
1. Type the following command at the command prompt:
8181

8282
`curl -A "HaxerMen" <your web server address>`
83-
3. You'll see your Web server response.
84-
4. Go to the Firewall Network rule logs on the Azure portal to find an alert similar to the following message:
83+
1. You'll see your Web server response.
84+
1. Go to the Firewall Network rule logs on the Azure portal to find an alert similar to the following message:
8585

8686
```
8787
{ “msg” : “TCP request from 10.0.100.5:16036 to 10.0.20.10:80. Action: Alert. Rule: 2032081. IDS:
@@ -91,7 +91,7 @@ You can use `curl` to control various HTTP headers and simulate malicious traffi
9191

9292
> [!NOTE]
9393
> It can take some time for the data to begin showing in the logs. Give it at least a couple minutes to allow for the logs to begin showing the data.
94-
5. Add a signature rule for signature 2032081:
94+
1. Add a signature rule for signature 2032081:
9595

9696
1. Select the **DemoFirewallPolicy** and under **Settings** select **IDPS**.
9797
1. Select the **Signature rules** tab.
@@ -102,15 +102,15 @@ You can use `curl` to control various HTTP headers and simulate malicious traffi
102102

103103

104104

105-
6. On WorkerVM, run the `curl` command again:
105+
1. On WorkerVM, run the `curl` command again:
106106

107107
`curl -A "HaxerMen" <your web server address>`
108108

109109
Since the HTTP request is now blocked by the firewall, you'll see the following output after the connection timeout expires:
110110

111111
`read tcp 10.0.100.5:55734->10.0.20.10:80: read: connection reset by peer`
112112

113-
7. Go to the Monitor logs in the Azure portal and find the message for the blocked request.
113+
1. Go to the Monitor logs in the Azure portal and find the message for the blocked request.
114114
<!---8. Now you can bypass the IDPS function using the **Bypass list**.
115115
116116
1. On the **IDPS (preview)** page, select the **Bypass list** tab.
@@ -132,8 +132,8 @@ Use the following steps to test TLS Inspection with URL filtering.
132132

133133
1. Edit the firewall policy application rules and add a new rule called `AllowURL` to the `AllowWeb` rule collection. Configure the target URL `www.nytimes.com/section/world`, Source IP address **\***, Destination type **URL**, select **TLS Inspection**, and protocols **http, https**.
134134

135-
3. When the deployment completes, open a browser on WorkerVM and go to `https://www.nytimes.com/section/world` and validate that the HTML response is displayed as expected in the browser.
136-
4. In the Azure portal, you can view the entire URL in the Application rule Monitoring logs:
135+
1. When the deployment completes, open a browser on WorkerVM and go to `https://www.nytimes.com/section/world` and validate that the HTML response is displayed as expected in the browser.
136+
1. In the Azure portal, you can view the entire URL in the Application rule Monitoring logs:
137137

138138
:::image type="content" source="media/premium-deploy/alert-message-url.png" alt-text="Alert message showing the URL":::
139139

@@ -150,13 +150,12 @@ Some HTML pages may look incomplete because they refer to other URLs that are de
150150

151151
Let's create an application rule to allow access to sports web sites.
152152
1. From the portal, open your resource group and select **DemoFirewallPolicy**.
153-
2. Select **Application Rules**, and then **Add a rule collection**.
154-
3. For **Name**, type *GeneralWeb*, **Priority** *103*, **Rule collection group** select **DefaultApplicationRuleCollectionGroup**.
155-
4. Under **Rules** for **Name** type *AllowSports*, **Source** *\**, **Protocol** *http, https*, select **TLS Inspection**, **Destination Type** select *Web categories*, **Destination** select *Sports*.
156-
5. Select **Add**.
153+
1. Select **Application Rules**, and then **Add a rule collection**.
154+
1. For **Name**, type *GeneralWeb*, **Priority** *103*, **Rule collection group** select **DefaultApplicationRuleCollectionGroup**.
155+
1. Under **Rules** for **Name** type *AllowSports*, **Source** *\**, **Protocol** *http, https*, select **TLS Inspection**, **Destination Type** select *Web categories*, **Destination** select *Sports*.
156+
1. Select **Add**.
157157

158-
:::image type="content" source="media/premium-deploy/web-categories.png" alt-text="Sports web category":::
159-
6. When the deployment completes, go to **WorkerVM** and open a web browser and browse to `https://www.nfl.com`.
158+
1. When the deployment completes, go to **WorkerVM** and open a web browser and browse to `https://www.nfl.com`.
160159

161160
You should see the NFL web page, and the Application rule log shows that a **Web Category: Sports** rule was matched and the request was allowed.
162161

articles/firewall/premium-features.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -85,14 +85,10 @@ IDPS allows you to detect attacks in all ports and protocols for nonencrypted tr
8585

8686
The IDPS Bypass List is a configuration that allows you to not filter traffic to any of the IP addresses, ranges, and subnets specified in the bypass list. The IDPS Bypass list isn't intended to be a way to improve throughput performance, as the firewall is still subject to the performance associated with your use case. For more information, see [Azure Firewall performance](firewall-performance.md#performance-data).
8787

88-
:::image type="content" source="media/premium-features/idps-bypass-list.png" alt-text="Screenshot showing the IDPS Bypass list screen." lightbox="media/premium-features/idps-bypass-list.png":::
89-
9088
### IDPS Private IP ranges
9189

9290
In Azure Firewall Premium IDPS, private IP address ranges are used to identify if traffic is inbound, outbound, or internal (East-West). Each signature is applied on specific traffic direction, as indicated in the signature rules table. By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. So, traffic sent from a private IP address range to a private IP address range is considered internal. To modify your private IP addresses, you can now easily edit, remove, or add ranges as needed.
9391

94-
:::image type="content" source="media/premium-features/idps-private-ip.png" alt-text="Screenshot showing IDPS private IP address ranges.":::
95-
9692
### IDPS signature rules
9793

9894
IDPS signature rules allow you to:
@@ -122,8 +118,6 @@ IDPS signature rules have the following properties:
122118
|Source/Destination Ports |The ports associated with this signature.|
123119
|Last updated |The last date that this signature was introduced or modified.|
124120

125-
:::image type="content" source="media/idps-signature-categories/firewall-idps-signature.png" alt-text="Screenshot showing the IDPS signature rule columns." lightbox="media/idps-signature-categories/firewall-idps-signature.png":::
126-
127121
For more information about IDPS, see [Taking Azure Firewall IDPS on a Test Drive](https://techcommunity.microsoft.com/t5/azure-network-security-blog/taking-azure-firewall-idps-on-a-test-drive/ba-p/3872706).
128122

129123
## URL filtering
@@ -157,8 +151,6 @@ You can create exceptions to your web category rules. Create separate allow or d
157151

158152
You can identify what category a given FQDN or URL is by using the **Web Category Check** feature. To use this, select the **Web Categories** tab under **Firewall Policy Settings**. This is useful when defining your application rules for destination traffic.
159153

160-
:::image type="content" source="media/premium-features/firewall-category-search.png" alt-text="Firewall category search dialog":::
161-
162154
> [!IMPORTANT]
163155
> To use the **Web Category Check** feature, the user must have an access of Microsoft.Network/azureWebCategories/* for **subscription** level, not resource group level.
164156

articles/firewall/premium-migrate.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,6 @@ During your migration process, you may need to migrate your Classic firewall rul
5050

5151
1. From the Azure portal, select your standard firewall. On the **Overview** page, select **Migrate to firewall policy**.
5252

53-
:::image type="content" source="media/premium-migrate/firewall-overview-migrate.png" lightbox="media/premium-migrate/firewall-overview-migrate.png" alt-text="Screenshot showing migrate to firewall policy.":::
54-
5553
1. On the **Migrate to firewall policy** page, select **Review + create**.
5654
1. Select **Create**.
5755

0 commit comments

Comments
 (0)