You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ddos-protection/ddos-protection-overview.md
+33-25Lines changed: 33 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: AbdullahBell
6
6
ms.service: ddos-protection
7
7
ms.topic: overview
8
8
ms.workload: infrastructure-services
9
-
ms.date: 01/17/2023
9
+
ms.date: 08/28/2023
10
10
ms.author: abell
11
11
ms.custom: ignite-2022, references_regions
12
12
---
@@ -17,11 +17,11 @@ Distributed denial of service (DDoS) attacks are some of the largest availabilit
17
17
18
18
Azure DDoS Protection, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks. It's automatically tuned to help protect your specific Azure resources in a virtual network. Protection is simple to enable on any new or existing virtual network, and it requires no application or resource changes.
19
19
20
-
:::image type="content" source="./media/ddos-best-practices/ddos-protection-overview-architecture.png" alt-text="Diagram of the reference architecture for a DDoS protected PaaS web application.":::
20
+
:::image type="content" source="./media/ddos-best-practices/ddos-protection-overview-architecture.png" alt-text="Diagram of the reference architecture for an Azure DDoS protected PaaS web application.":::
21
21
22
22
Azure DDoS Protection protects at layer 3 and layer 4 network layers. For web applications protection at layer 7, you need to add protection at the application layer using a WAF offering. For more information, see [Application DDoS protection](../web-application-firewall/shared/application-ddos-protection.md).
23
23
24
-
## Tiers
24
+
## Azure DDoS Protection: Tiers
25
25
26
26
### DDoS Network Protection
27
27
@@ -32,47 +32,46 @@ Azure DDoS Network Protection, combined with application design best practices,
32
32
DDoS IP Protection is a pay-per-protected IP model. DDoS IP Protection contains the same core engineering features as DDoS Network Protection, but will differ in the following value-added services: DDoS rapid response support, cost protection, and discounts on WAF. For more information about enabling DDoS IP Protection, see [Quickstart: Create and configure Azure DDoS IP Protection using Azure PowerShell](manage-ddos-protection-powershell-ip.md).
33
33
34
34
35
-
For more information about the tiers, see [Tier comparison](ddos-protection-sku-comparison.md).
36
-
## Key benefits
35
+
For more information about the tiers, see [DDoS Protection tier comparison](ddos-protection-sku-comparison.md).
36
+
## Azure DDoS Protection: Key Features
37
37
38
-
### Always-on traffic monitoring
38
+
-**Always-on traffic monitoring:**
39
39
Your application traffic patterns are monitored 24 hours a day, 7 days a week, looking for indicators of DDoS attacks. Azure DDoS Protection instantly and automatically mitigates the attack, once it's detected.
40
40
41
-
### Adaptive real time tuning
41
+
-**Adaptive real time tuning:**
42
42
Intelligent traffic profiling learns your application's traffic over time, and selects and updates the profile that is the most suitable for your service. The profile adjusts as traffic changes over time.
43
43
44
-
### DDoS Protection telemetry, monitoring, and alerting
44
+
-**DDoS Protection analytics, metrics, and alerting:**
45
45
Azure DDoS Protection applies three auto-tuned mitigation policies (TCP SYN, TCP, and UDP) for each public IP of the protected resource, in the virtual network that has DDoS enabled. The policy thresholds are auto-configured via machine learning-based network traffic profiling. DDoS mitigation occurs for an IP address under attack only when the policy threshold is exceeded.
46
+
- **Attack analytics:**
47
+
Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to [Microsoft Sentinel](../sentinel/data-connectors/azure-ddos-protection.md) or an offline security information and event management (SIEM) system for near real-time monitoring during an attack. See [View and configure DDoS diagnostic logging](diagnostic-logging.md) to learn more.
48
+
49
+
- **Attack metrics:**
50
+
Summarized metrics from each attack are accessible through Azure Monitor. See [View and configure DDoS protection telemetry](telemetry.md) to learn more.
51
+
52
+
- **Attack alerting:**
53
+
Alerts can be configured at the start and stop of an attack, and over the attack's duration, using built-in attack metrics. Alerts integrate into your operational software like Microsoft Azure Monitor logs, Splunk, Azure Storage, Email, and the Azure portal. See [View and configure DDoS protection alerts
54
+
](alerts.md) to learn more.
46
55
47
-
### Azure DDoS Rapid Response
56
+
-**Azure DDoS Rapid Response:**
48
57
During an active attack, Azure DDoS Protection customers have access to the DDoS Rapid Response (DRR) team, who can help with attack investigation during an attack and post-attack analysis. For more information, see [Azure DDoS Rapid Response](ddos-rapid-response.md).
49
58
50
-
### Native platform integration
59
+
-**Native platform integration:**
51
60
Natively integrated into Azure. Includes configuration through the Azure portal. Azure DDoS Protection understands your resources and resource configuration.
52
61
53
-
### Turnkey protection
62
+
-**Turnkey protection:**
54
63
Simplified configuration immediately protects all resources on a virtual network as soon as DDoS Network Protection is enabled. No intervention or user definition is required. Similarly, simplified configuration immediately protects a public IP resource when DDoS IP Protection is enabled for it.
55
64
56
-
### Multi-Layered protection
65
+
-**Multi-Layered protection:**
57
66
When deployed with a web application firewall (WAF), Azure DDoS Protection protects both at the network layer (Layer 3 and 4, offered by Azure DDoS Protection) and at the application layer (Layer 7, offered by a WAF). WAF offerings include Azure [Application Gateway WAF SKU](../web-application-firewall/ag/ag-overview.md?toc=/azure/virtual-network/toc.json) and third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall).
58
67
59
-
### Extensive mitigation scale
68
+
-**Extensive mitigation scale:**
60
69
All L3/L4 attack vectors can be mitigated, with global capacity, to protect against the largest known DDoS attacks.
61
70
62
-
### Attack analytics
63
-
Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to [Microsoft Sentinel](../sentinel/data-connectors/azure-ddos-protection.md) or an offline security information and event management (SIEM) system for near real-time monitoring during an attack. See [View and configure DDoS diagnostic logging](diagnostic-logging.md) to learn more.
64
-
65
-
### Attack metrics
66
-
Summarized metrics from each attack are accessible through Azure Monitor. See [View and configure DDoS protection telemetry](telemetry.md) to learn more.
67
-
68
-
### Attack alerting
69
-
Alerts can be configured at the start and stop of an attack, and over the attack's duration, using built-in attack metrics. Alerts integrate into your operational software like Microsoft Azure Monitor logs, Splunk, Azure Storage, Email, and the Azure portal. See [View and configure DDoS protection alerts
70
-
](alerts.md) to learn more.
71
-
72
-
### Cost guarantee
71
+
-**Cost guarantee:**
73
72
Receive data-transfer and application scale-out service credit for resource costs incurred as a result of documented DDoS attacks.
74
73
75
-
## Architecture
74
+
## Azure DDoS Protection: Architecture
76
75
77
76
Azure DDoS Protection is designed for [services that are deployed in a virtual network](../virtual-network/virtual-network-for-azure-services.md). For other services, the default infrastructure-level DDoS protection applies, which defends against common network-layer attacks. To learn more about supported architectures, see [DDoS Protection reference architectures](./ddos-protection-reference-architectures.md).
78
77
@@ -83,6 +82,15 @@ For DDoS IP Protection, there's no need to create a DDoS protection plan. Custom
83
82
84
83
To learn about Azure DDoS Protection pricing, see [Azure DDoS Protection pricing](https://azure.microsoft.com/pricing/details/ddos-protection/).
85
84
85
+
## Best Practices for DDoS Protection
86
+
Maximize the effectiveness of your DDoS protection strategy by following these best practices:
87
+
88
+
- Design your applications and infrastructure with redundancy and resilience in mind.
89
+
- Implement a multi-layered security approach, including network, application, and data protection.
90
+
- Prepare an incident response plan to ensure a coordinated response to DDoS attacks.
91
+
92
+
To learn more about best practices, see [Fundamental best practices](./fundamental-best-practices.md).
93
+
86
94
## DDoS Protection FAQ
87
95
88
96
For frequently asked questions, see the [DDoS Protection FAQ](ddos-faq.yml).
0 commit comments