|
1 | 1 | ---
|
2 |
| -title: Introduction to effective security rules view in Azure Network Watcher |
| 2 | +title: Effective security rules |
| 3 | +titleSuffix: Azure Network Watcher |
3 | 4 | description: Learn about Azure Network Watcher effective security rules view capability.
|
4 | 5 | services: network-watcher
|
5 | 6 | author: halkazwini
|
6 | 7 | ms.service: network-watcher
|
7 | 8 | ms.topic: conceptual
|
8 | 9 | ms.workload: infrastructure-services
|
9 |
| -ms.date: 03/18/2022 |
| 10 | +ms.date: 03/27/2023 |
10 | 11 | ms.author: halkazwini
|
11 |
| -ms.custom: engagement-fy23 |
| 12 | +ms.custom: template-concept, engagement-fy23 |
12 | 13 | ---
|
13 | 14 |
|
14 |
| -# Introduction to Effective security rules view in Azure Network Watcher |
| 15 | +# Effective security rules view in Azure Network Watcher |
15 | 16 |
|
16 |
| -Network Security groups are associated at a subnet level or at a NIC level. When associated at a subnet level, it applies to all the VM instances in the subnet. Effective security rules view returns all the configured NSGs and rules that are associated at a NIC and subnet level for a virtual machine providing insight into the configuration. In addition, the effective security rules are returned for each of the NICs in a VM. Using Effective security rules view, you can assess a VM for network vulnerabilities such as open ports. You can also validate if your Network Security Group is working as expected based on a [comparison between the configured and the approved security rules](network-watcher-nsg-auditing-powershell.md). |
| 17 | +[Network security groups](../virtual-network/network-security-groups-overview.md) can be associated at a subnet level or at a network interface level. When associated at a subnet level, it applies to all virtual machines (VMs) in the virtual network subnet. With effective security rules view in Network Watcher, you can see all inbound and outbound security rules that apply to a virtual machine’s network interface(s). These rules are set by the network security groups that are associated at the virtual machine's subnet level and network interface level. Using effective security rules view, you can assess a virtual machine for network vulnerabilities such as open ports. |
17 | 18 |
|
18 |
| -In addition to network security rules placed via NSGs, Network Watcher’s Effective security rules blade also shows the security admin rules associated with |
19 |
| -[Azure Virtual Network Manager (AVNM).](../virtual-network-manager/overview.md) Azure Virtual Network Manager is a management service that enables users to group, configure, deploy and manage Virtual Networks globally across subscriptions. AVNM security configuration allows users to define a collection of rules that can be applied to one or more network security groups at the global level. These security rules have a higher priority than network security group (NSG) rules. |
| 19 | +In addition to security rules set by network security groups, effective security rules view also shows the security admin rules associated with |
| 20 | +[Azure Virtual Network Manager](../virtual-network-manager/overview.md). Azure Virtual Network Manager is a management service that enables users to group, configure, deploy and manage virtual networks globally across subscriptions. Azure Virtual Network Manager security configuration allows users to define a collection of rules that can be applied to one or more network security groups at the global level. These security rules have a higher priority than network security group rules. |
20 | 21 |
|
21 |
| -A more extended use case is in security compliance and auditing. You can define a prescriptive set of security rules as a model for security governance in your organization. A periodic compliance audit can be implemented in a programmatic way by comparing the prescriptive rules with the effective rules for each of the VMs in your network. |
| 22 | +A more extended use case is in security compliance and auditing. You can define a prescriptive set of security rules as a model for security governance in your organization. You can implement a periodic compliance audit in a programmatic way by comparing the prescriptive rules with the effective rules for each of the virtual machines in your network. |
22 | 23 |
|
23 |
| -In the portal rules are displayed for each Network Interface and grouped by inbound vs outbound. This provides a simple view into the rules applied to a virtual machine. A download button is provided to easily download all the security rules no matter the tab into a CSV file. |
| 24 | +In Azure portal, rules are displayed for each network interface and grouped by inbound vs outbound. This provides a simple view into the rules applied to a virtual machine. A download button is provided to easily download all the security rules into a CSV file. |
24 | 25 |
|
25 |
| -![security group view][1] |
| 26 | +:::image type="content" source="./media/network-watcher-security-group-view-overview/effective-security-rules-inline.png" alt-text="Screenshot of Azure Network Watcher effective security rules in Azure portal." lightbox="./media/network-watcher-security-group-view-overview/effective-security-rules-expanded.png"::: |
26 | 27 |
|
27 |
| -Rules can be selected and a new blade opens up to show the Network Security Group and source and destination prefixes. From this blade you can navigate directly to the Network Security Group resource. |
| 28 | +You can select a rule to see associated source and destination prefixes. |
28 | 29 |
|
29 |
| -![drilldown][2] |
| 30 | +:::image type="content" source="./media/network-watcher-security-group-view-overview/security-rule-prefixes.png" alt-text="Screenshot of security rule associated address prefixes."::: |
30 | 31 |
|
31 | 32 | ### Next steps
|
32 | 33 |
|
33 |
| -You can also use the *Effective Security Groups* feature through other methods listed below: |
34 |
| -* [REST API](/rest/api/virtualnetwork/NetworkInterfaces/ListEffectiveNetworkSecurityGroups) |
35 |
| -* [PowerShell](/powershell/module/az.network/get-azeffectivenetworksecuritygroup) |
36 |
| -* [Azure CLI](/cli/azure/network/nic#az-network-nic-list-effective-nsg) |
37 |
| - |
38 |
| -Learn how to audit your Network Security Group settings by visiting [Audit Network Security Group settings with PowerShell](network-watcher-nsg-auditing-powershell.md) |
39 |
| - |
40 |
| -[1]: ./media/network-watcher-security-group-view-overview/updated-security-group-view.png |
41 |
| -[2]: ./media/network-watcher-security-group-view-overview/figure1.png |
| 34 | +- To learn about Network Watcher, see [What is Azure Network Watcher?](network-watcher-monitoring-overview.md) |
| 35 | +- To learn how traffic is evaluated with network security groups, see [How network security groups work](../virtual-network/network-security-group-how-it-works.md). |
0 commit comments