You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/explicit-proxy.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,8 +37,6 @@ With the Explicit proxy mode (supported for HTTP/S), you can define proxy settin
37
37
38
38
- To use the Proxy autoconfiguration (PAC) file, select **Enable proxy auto-configuration**.
39
39
40
-
:::image type="content" source="media/explicit-proxy/proxy-auto-configuration.png" alt-text="Screenshot showing the proxy autoconfiguration file setting.":::
41
-
42
40
- First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy** page, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
43
41
44
42
The SAS URL must have READ permissions so the firewall can download the file. If changes are made to the PAC file, a new SAS URL needs to be generated and configured on the firewall **Enable explicit proxy** page.
Copy file name to clipboardExpand all lines: articles/firewall/firewall-azure-policy.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,8 +108,6 @@ Now you attempt to create a Firewall Policy with Threat Intelligence disabled.
108
108
109
109
You should see an error that says your resource was disallowed by policy, confirming that your Azure Policy doesn't allow firewall policies that have Threat Intelligence disabled.
Copy file name to clipboardExpand all lines: articles/firewall/firewall-copilot.md
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,8 +96,6 @@ Get **log information** about the traffic intercepted by the IDPS feature instea
96
96
- What are the top 20 IDPS hits from the last seven days for Firewall _\<Firewall name\>_ in resource group _\<resource group name\>_?
97
97
- Show me in tabular form the top 50 attacks that targeted Firewall _\<Firewall name\>_ in subscription _\<subscription name\>_ in the past month.
98
98
99
-
:::image type="content" source="media/firewall-copilot/copilot-capability-1-embedded.png" alt-text="Screenshot showing the Retrieve the top IDPS signature hits for an Azure Firewall capability." lightbox="media/firewall-copilot/copilot-capability-1-embedded.png":::
100
-
101
99
### Enrich the threat profile of an IDPS signature beyond log information
102
100
103
101
Get **additional details** to enrich the threat information/profile of an IDPS signature instead of compiling it yourself manually.
@@ -108,8 +106,6 @@ Get **additional details** to enrich the threat information/profile of an IDPS s
108
106
- What can you tell me about this attack? What are the other attacks this attacker is known for?
109
107
- I see that the third signature ID is associated with CVE _\<CVE number\>_, tell me more about this CVE.
110
108
111
-
:::image type="content" source="media/firewall-copilot/copilot-capability-2-embedded.png" alt-text="Screenshot showing the Enrich the threat profile of an IDPS signature beyond log information capability." lightbox="media/firewall-copilot/copilot-capability-2-embedded.png":::
112
-
113
109
> [!NOTE]
114
110
> The Microsoft Threat Intelligence plugin is another source that Security Copilot may use to provide threat intelligence for IDPS signatures.
115
111
@@ -123,8 +119,6 @@ Perform a **fleet-wide search** (over any scope) for a threat across all your Fi
123
119
- Was the top hit seen by any other Firewall in the subscription _\<subscription name\>_?
124
120
- Over the past week did any Firewall in resource group _\<resource group name\>_ see signature ID _\<ID number\>_?
125
121
126
-
:::image type="content" source="media/firewall-copilot/copilot-capability-3-embedded.png" alt-text="Screenshot showing the Look for a given IDPS signature across your tenant, subscription, or resource group capability." lightbox="media/firewall-copilot/copilot-capability-3-embedded.png":::
127
-
128
122
### Generate recommendations to secure your environment using Azure Firewall's IDPS feature
129
123
130
124
Get **information from documentation** about using Azure Firewall's IDPS feature to secure your environment instead of having to look up this information manually.
Copy file name to clipboardExpand all lines: articles/firewall/ip-groups.md
+7-12Lines changed: 7 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: vhorne
6
6
ms.service: azure-firewall
7
7
ms.custom: devx-track-azurepowershell
8
8
ms.topic: concept-article
9
-
ms.date: 10/10/2023
9
+
ms.date: 02/10/2025
10
10
ms.author: victorh
11
11
---
12
12
@@ -37,18 +37,17 @@ An IP Group can be created using the Azure portal, Azure CLI, or REST API. For m
37
37
38
38
## Browse IP Groups
39
39
1. In the Azure portal search bar, type **IP Groups** and select it. You can see the list of the IP Groups, or you can select **Add** to create a new IP Group.
40
-
2. Select an IP Group to open the overview page. You can edit, add, or delete IP addresses or IP Groups.
40
+
1. Select an IP Group to open the overview page. You can edit, add, or delete IP addresses or IP Groups.
41
41
42
-

43
42
44
43
## Manage an IP Group
45
44
46
45
You can see all the IP addresses in the IP Group and the rules or resources that are associated with it. To delete an IP Group, you must first dissociate the IP Group from the resource that is using it.
47
46
48
47
1. To view or edit the IP addresses, select **IP Addresses** under **Settings** on the left pane.
49
-
2. To add a single or multiple IP address(es), select **Add IP Addresses**. This opens the **Drag or Browse** page for an upload, or you can enter the address manually.
50
-
3. Selecting the ellipses (**…**) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
51
-
4. Finally, can export the file in the CSV file format.
48
+
1. To add a single or multiple IP address(es), select **Add IP Addresses**. This opens the **Drag or Browse** page for an upload, or you can enter the address manually.
49
+
1. Selecting the ellipses (**…**) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
50
+
1. Finally, can export the file in the CSV file format.
52
51
53
52
> [!NOTE]
54
53
> If you delete all the IP addresses in an IP Group while it is still in use in a rule, that rule is skipped.
@@ -58,8 +57,6 @@ You can see all the IP addresses in the IP Group and the rules or resources that
58
57
59
58
You can now select **IP Group** as a **Source type** or **Destination type** for the IP address(es) when you create Azure Firewall DNAT, application, or network rules.
60
59
61
-

62
-
63
60
## Parallel IP Group updates (preview)
64
61
65
62
You can now update multiple IP Groups in parallel at the same time. This is particularly useful for administrators who want to make configuration changes more quickly and at scale, especially when making those changes using a dev ops approach (templates, ARM, CLI, and Azure PowerShell).
@@ -92,10 +89,8 @@ It can take several minutes for this to take effect. Once the feature is complet
92
89
### Azure portal
93
90
94
91
1. Navigate to **Preview features** in the Azure portal.
95
-
2. Search and register **AzureFirewallParallelIPGroupUpdate**.
96
-
3. Ensure the feature is enabled.
97
-
98
-
:::image type="content" source="media/ip-groups/preview-features-parallel.png" alt-text="Screenshot showing the parallel IP groups feature.":::
92
+
1. Search and register **AzureFirewallParallelIPGroupUpdate**.
Copy file name to clipboardExpand all lines: articles/firewall/premium-deploy-certificates-enterprise-ca.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,31 +54,33 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
54
54
1. Submit the request and install the certificate.
55
55
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.
56
56
1. Navigate to the **Content** tab and select **Certificates**.
57
-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/internet-properties.png" alt-text="Screenshot of Internet properties":::
57
+
58
58
1. Select the certificate that was just issued and then select **Export**.
59
-
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/export-certificate.png" alt-text="Screenshot of export certificate":::
59
+
60
60
1. Select **Next** to begin the wizard. Select **Yes, export the private key**, and then select **Next**.
1. .pfx file format is selected by default. Uncheck **Include all certificates in the certification path if possible**. If you export the entire certificate chain, the import process to Azure Firewall will fail.
1. From a domain-joined machine within the Source range of the rule, navigate to your Destination and select the lock symbol next to the address bar in your browser. The certificate should show that it was issued by your Enterprise CA rather than a public CA.
83
85
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/browser-certificate.png" alt-text="Screenshot showing the browser certificate":::
84
86
1. Show the certificate to display more details, including the certificate path.
Copy file name to clipboardExpand all lines: articles/firewall/premium-deploy.md
+19-20Lines changed: 19 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: vhorne
5
5
ms.service: azure-firewall
6
6
services: firewall
7
7
ms.topic: how-to
8
-
ms.date: 02/28/2022
8
+
ms.date: 02/10/2025
9
9
ms.author: victorh
10
10
---
11
11
@@ -62,11 +62,11 @@ Now you can test IDPS, TLS Inspection, Web filtering, and Web categories.
62
62
To collect firewall logs, you need to add diagnostics settings to collect firewall logs.
63
63
64
64
1. Select the **DemoFirewall** and under **Monitoring**, select **Diagnostic settings**.
65
-
2. Select **Add diagnostic setting**.
66
-
3. For **Diagnostic setting name**, type *fw-diag*.
67
-
4. Under **log**, select **AzureFirewallApplicationRule**, and **AzureFirewallNetworkRule**.
68
-
5. Under **Destination details**, select **Send to Log Analytics workspace**.
69
-
6. Select **Save**.
65
+
1. Select **Add diagnostic setting**.
66
+
1. For **Diagnostic setting name**, type *fw-diag*.
67
+
1. Under **log**, select **AzureFirewallApplicationRule**, and **AzureFirewallNetworkRule**.
68
+
1. Under **Destination details**, select **Send to Log Analytics workspace**.
69
+
1. Select **Save**.
70
70
71
71
### IDPS tests
72
72
@@ -77,11 +77,11 @@ You can use `curl` to control various HTTP headers and simulate malicious traffi
77
77
#### To test IDPS for HTTP traffic:
78
78
79
79
1. On the WorkerVM virtual machine, open an administrator command prompt window.
80
-
2. Type the following command at the command prompt:
80
+
1. Type the following command at the command prompt:
81
81
82
82
`curl -A "HaxerMen" <your web server address>`
83
-
3. You'll see your Web server response.
84
-
4. Go to the Firewall Network rule logs on the Azure portal to find an alert similar to the following message:
83
+
1. You'll see your Web server response.
84
+
1. Go to the Firewall Network rule logs on the Azure portal to find an alert similar to the following message:
85
85
86
86
```
87
87
{ “msg” : “TCP request from 10.0.100.5:16036 to 10.0.20.10:80. Action: Alert. Rule: 2032081. IDS:
@@ -91,7 +91,7 @@ You can use `curl` to control various HTTP headers and simulate malicious traffi
91
91
92
92
> [!NOTE]
93
93
> It can take some time for the data to begin showing in the logs. Give it at least a couple minutes to allow for the logs to begin showing the data.
94
-
5. Add a signature rule for signature 2032081:
94
+
1. Add a signature rule for signature 2032081:
95
95
96
96
1. Select the **DemoFirewallPolicy** and under **Settings** select **IDPS**.
97
97
1. Select the **Signature rules** tab.
@@ -102,15 +102,15 @@ You can use `curl` to control various HTTP headers and simulate malicious traffi
102
102
103
103
104
104
105
-
6. On WorkerVM, run the `curl` command again:
105
+
1. On WorkerVM, run the `curl` command again:
106
106
107
107
`curl -A "HaxerMen" <your web server address>`
108
108
109
109
Since the HTTP request is now blocked by the firewall, you'll see the following output after the connection timeout expires:
110
110
111
111
`read tcp 10.0.100.5:55734->10.0.20.10:80: read: connection reset by peer`
112
112
113
-
7. Go to the Monitor logs in the Azure portal and find the message for the blocked request.
113
+
1. Go to the Monitor logs in the Azure portal and find the message for the blocked request.
114
114
<!---8. Now you can bypass the IDPS function using the **Bypass list**.
115
115
116
116
1. On the **IDPS (preview)** page, select the **Bypass list** tab.
@@ -132,8 +132,8 @@ Use the following steps to test TLS Inspection with URL filtering.
132
132
133
133
1. Edit the firewall policy application rules and add a new rule called `AllowURL` to the `AllowWeb` rule collection. Configure the target URL `www.nytimes.com/section/world`, Source IP address **\***, Destination type **URL**, select **TLS Inspection**, and protocols **http, https**.
134
134
135
-
3. When the deployment completes, open a browser on WorkerVM and go to `https://www.nytimes.com/section/world` and validate that the HTML response is displayed as expected in the browser.
136
-
4. In the Azure portal, you can view the entire URL in the Application rule Monitoring logs:
135
+
1. When the deployment completes, open a browser on WorkerVM and go to `https://www.nytimes.com/section/world` and validate that the HTML response is displayed as expected in the browser.
136
+
1. In the Azure portal, you can view the entire URL in the Application rule Monitoring logs:
137
137
138
138
:::image type="content" source="media/premium-deploy/alert-message-url.png" alt-text="Alert message showing the URL":::
139
139
@@ -150,13 +150,12 @@ Some HTML pages may look incomplete because they refer to other URLs that are de
150
150
151
151
Let's create an application rule to allow access to sports web sites.
152
152
1. From the portal, open your resource group and select **DemoFirewallPolicy**.
153
-
2. Select **Application Rules**, and then **Add a rule collection**.
154
-
3. For **Name**, type *GeneralWeb*, **Priority***103*, **Rule collection group** select **DefaultApplicationRuleCollectionGroup**.
155
-
4. Under **Rules** for **Name** type *AllowSports*, **Source***\**, **Protocol***http, https*, select **TLS Inspection**, **Destination Type** select *Web categories*, **Destination** select *Sports*.
156
-
5. Select **Add**.
153
+
1. Select **Application Rules**, and then **Add a rule collection**.
154
+
1. For **Name**, type *GeneralWeb*, **Priority***103*, **Rule collection group** select **DefaultApplicationRuleCollectionGroup**.
155
+
1. Under **Rules** for **Name** type *AllowSports*, **Source***\**, **Protocol***http, https*, select **TLS Inspection**, **Destination Type** select *Web categories*, **Destination** select *Sports*.
156
+
1. Select **Add**.
157
157
158
-
:::image type="content" source="media/premium-deploy/web-categories.png" alt-text="Sports web category":::
159
-
6. When the deployment completes, go to **WorkerVM** and open a web browser and browse to `https://www.nfl.com`.
158
+
1. When the deployment completes, go to **WorkerVM** and open a web browser and browse to `https://www.nfl.com`.
160
159
161
160
You should see the NFL web page, and the Application rule log shows that a **Web Category: Sports** rule was matched and the request was allowed.
Copy file name to clipboardExpand all lines: articles/firewall/premium-features.md
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,14 +85,10 @@ IDPS allows you to detect attacks in all ports and protocols for nonencrypted tr
85
85
86
86
The IDPS Bypass List is a configuration that allows you to not filter traffic to any of the IP addresses, ranges, and subnets specified in the bypass list. The IDPS Bypass list isn't intended to be a way to improve throughput performance, as the firewall is still subject to the performance associated with your use case. For more information, see [Azure Firewall performance](firewall-performance.md#performance-data).
87
87
88
-
:::image type="content" source="media/premium-features/idps-bypass-list.png" alt-text="Screenshot showing the IDPS Bypass list screen." lightbox="media/premium-features/idps-bypass-list.png":::
89
-
90
88
### IDPS Private IP ranges
91
89
92
90
In Azure Firewall Premium IDPS, private IP address ranges are used to identify if traffic is inbound, outbound, or internal (East-West). Each signature is applied on specific traffic direction, as indicated in the signature rules table. By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. So, traffic sent from a private IP address range to a private IP address range is considered internal. To modify your private IP addresses, you can now easily edit, remove, or add ranges as needed.
93
91
94
-
:::image type="content" source="media/premium-features/idps-private-ip.png" alt-text="Screenshot showing IDPS private IP address ranges.":::
95
-
96
92
### IDPS signature rules
97
93
98
94
IDPS signature rules allow you to:
@@ -122,8 +118,6 @@ IDPS signature rules have the following properties:
122
118
|Source/Destination Ports |The ports associated with this signature.|
123
119
|Last updated |The last date that this signature was introduced or modified.|
For more information about IDPS, see [Taking Azure Firewall IDPS on a Test Drive](https://techcommunity.microsoft.com/t5/azure-network-security-blog/taking-azure-firewall-idps-on-a-test-drive/ba-p/3872706).
128
122
129
123
## URL filtering
@@ -157,8 +151,6 @@ You can create exceptions to your web category rules. Create separate allow or d
157
151
158
152
You can identify what category a given FQDN or URL is by using the **Web Category Check** feature. To use this, select the **Web Categories** tab under **Firewall Policy Settings**. This is useful when defining your application rules for destination traffic.
> To use the **Web Category Check** feature, the user must have an access of Microsoft.Network/azureWebCategories/* for **subscription** level, not resource group level.
0 commit comments