Skip to content

Commit 3528692

Browse files
authored
Merge pull request #108768 from memildin/asc-melvyn-20200129
Removed invalid ANH table
2 parents 0e07017 + 90ea0c6 commit 3528692

File tree

2 files changed

+4
-74
lines changed

2 files changed

+4
-74
lines changed

articles/security-center/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ landingContent:
3636
links:
3737
- text: Protect your containers
3838
url: container-security.md
39-
- text: Add dynamic compliance packages
40-
url: update-regulatory-compliance-packages.md
39+
- text: Integrated vulnerability assessment for VMs
40+
url: built-in-vulnerability-assessment.md
4141
- text: Review the schemas for security alerts
4242
url: alerts-schemas.md
4343
- text: Automate responses to alerts and recommendations

articles/security-center/security-center-adaptive-network-hardening.md

Lines changed: 2 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Adaptive Network Hardening provides recommendations to further harden the NSG ru
2727
For example, let's say the existing NSG rule is to allow traffic from 140.20.30.10/24 on port 22. The Adaptive Network Hardening's recommendation, based on the analysis, would be to narrow the range and allow traffic from 140.23.30.10/29 – which is a narrower IP range, and deny all other traffic to that port.
2828

2929
>[!TIP]
30-
> Adaptive Network Hardening recommendations are only supported on specific ports. For the full list, see [Which ports are supported?](#which-ports-are-supported) below.
30+
> Adaptive Network Hardening recommendations are only supported on the following specific ports (for both UDP and TCP): 13, 17, 19, 22, 23, 53, 69, 81, 111, 119, 123, 135, 137, 138, 139, 161, 162, 389, 445, 512, 514, 593, 636, 873, 1433, 1434, 1900, 1900, 2049, 2301, 2323, 2381, 3268, 3306, 3389, 4333, 5353, 5432, 5555, 5800, 5900, 5900, 5985, 5986, 6379, 6379, 7000, 7001, 7199, 8081, 8089, 8545, 9042, 9160, 9300, 11211, 16379, 26379, 27017, 37215
3131
3232

3333
![Network hardening view](./media/security-center-adaptive-network-hardening/traffic-hardening.png)
@@ -135,74 +135,4 @@ When necessary, you can delete a recommended rule for the current session. For e
135135

136136
1. In the **Rules** tab, click on the three dots (...) at the end of the rule's row, and click **Delete**.
137137

138-
![hardening rules](./media/security-center-adaptive-network-hardening/delete-hard-rule.png)
139-
140-
141-
142-
## Which ports are supported?
143-
144-
Adaptive Network Hardening recommendations are only supported on specific ports. This table gives you the full list:
145-
146-
|Port|Protocol|Associated Service|
147-
|:---:|:----:|:----|
148-
|13|UDP|Daytime service|
149-
|17|UDP|QOTD protocol|
150-
|19|UDP|CHARGEN protocol|
151-
|22|TCP|SSH|
152-
|23|TCP|Telnet|
153-
|53|UDP|DNS|
154-
|69|UDP|TFTP|
155-
|81|TCP|Potentially malicious (TOR exit node)|
156-
|111|TCP/UDP|RPC|
157-
|119|TCP|NNTP|
158-
|123|UDP|NTP|
159-
|135|TCP/UDP|Endpoint Mapper; RPC; DCE|
160-
|137|TCP/UDP|NetBIOS Name Service|
161-
|138|TCP/UDP|NetBIOS Datagram Service|
162-
|139|TCP|NetBIOS Session Service|
163-
|161|TCP/UDP|SNMP|
164-
|162|TCP/UDP|SNMP|
165-
|389|TCP|LDAP|
166-
|445|TCP|SMB|
167-
|512|TCP|Rexec|
168-
|514|TCP|Remote shell|
169-
|593|TCP/UDP|HTTP RPC|
170-
|636|TCP|LDAP|
171-
|873|TCP|Rsync|
172-
|1433|TCP|MS SQL|
173-
|1434|UDP|MS SQL|
174-
|1900|UDP|SSDP|
175-
|1900|UDP|SSDP|
176-
|2049|TCP/UDP|NFS|
177-
|2301|TCP|Compaq management service|
178-
|2323|TCP|3d-nfsd|
179-
|2381|TCP|Compaq management service|
180-
|3268|TCP|LDAP|
181-
|3306|TCP|MySQL|
182-
|3389|TCP|RDP|
183-
|4333|TCP|mSQL|
184-
|5353|UDP|mDNS|
185-
|5432|TCP|PostgreSQL|
186-
|5555|TCP|Personal Agent; HP OmniBack|
187-
|5800|TCP|VNC|
188-
|5900|TCP|Remote framebuffer; VNC|
189-
|5900|TCP|VNC|
190-
|5985|TCP|Windows PowerShell|
191-
|5986|TCP|Windows PowerShell|
192-
|6379|TCP|Redis|
193-
|6379|TCP|Redis|
194-
|7000|TCP|Cassandra|
195-
|7001|TCP|Cassandra|
196-
|7199|TCP|Cassandra|
197-
|8081|TCP|CosmosDB; Sun Proxy Admin|
198-
|8089|TCP|Splunk|
199-
|8545|TCP|Potentially malicious (Cryptominer)|
200-
|9042|TCP|Cassandra|
201-
|9160|TCP|Cassandra|
202-
|9300|TCP|Elasticsearch|
203-
|11211|UDP|Memcached|
204-
|16379|TCP|Redis|
205-
|26379|TCP|Redis|
206-
|27017|TCP|MongoDB|
207-
|37215|TCP|Potentially malicious|
208-
||||
138+
![hardening rules](./media/security-center-adaptive-network-hardening/delete-hard-rule.png)

0 commit comments

Comments
 (0)