Skip to content

Commit 4108227

Browse files
authored
Merge pull request #214782 from vhorne/fwm-ti
update testing section
2 parents baf3732 + 7c750af commit 4108227

File tree

1 file changed

+2
-13
lines changed

1 file changed

+2
-13
lines changed

articles/firewall-manager/threat-intelligence-settings.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: article
8-
ms.date: 06/09/2022
8+
ms.date: 10/17/2022
99
ms.author: victorh
1010
---
1111

@@ -59,18 +59,7 @@ The following log excerpt shows a triggered rule for outbound traffic to a malic
5959

6060
## Testing
6161

62-
- **Outbound testing** - Outbound traffic alerts should be a rare occurrence, as it means that your environment has been compromised. To help test outbound alerts are working, the following FQDNs have been created to trigger an alert. Use the following FQDNs for your outbound tests:
63-
<br><br>
64-
65-
- `documentos-001.brazilsouth.cloudapp.azure.com`
66-
- `itaucardiupp.centralus.cloudapp.azure.com`
67-
- `azure-c.online`
68-
- `www.azureadsec.com`
69-
- `azurein360.co`
70-
71-
> [!NOTE]
72-
> These FQDNs are subject to change, so they are not guaranteed to always work. Any changes will be documented here.
73-
62+
- **Outbound testing** - Outbound traffic alerts should be a rare occurrence, as it means that your environment has been compromised. To help test outbound alerts are working, a test FQDN has been created that triggers an alert. Use `testmaliciousdomain.eastus.cloudapp.azure.com` for your outbound tests.
7463

7564
- **Inbound testing** - You can expect to see alerts on incoming traffic if DNAT rules are configured on the firewall. This is true even if only specific sources are allowed on the DNAT rule and traffic is otherwise denied. Azure Firewall doesn't alert on all known port scanners; only on scanners that are known to also engage in malicious activity.
7665

0 commit comments

Comments
 (0)