Skip to content

Commit 539032a

Browse files
Merge pull request #230666 from halkazwini/nw-nsg-flow4
tweaks
2 parents cf40505 + 9f93f34 commit 539032a

6 files changed

+32
-36
lines changed

articles/network-watcher/network-watcher-nsg-flow-logging-azure-resource-manager.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Network Watcher - Create NSG flow logs using an Azure Resource Manager template
3-
description: Use an Azure Resource Manager template and PowerShell to easily set up NSG Flow Logs.
2+
title: Manage NSG flow logs - ARM
3+
titleSuffix: Azure Network Watcher
4+
description: Learn how to manage network security group flow logs in Azure Network Watcher an Azure Resource Manager template.
45
services: network-watcher
56
author: halkazwini
6-
tags: azure-resource-manager
77
ms.service: network-watcher
88
ms.topic: how-to
99
ms.workload: infrastructure-services
@@ -12,7 +12,7 @@ ms.author: halkazwini
1212
ms.custom: fasttrack-edit, engagement-fy23
1313
---
1414

15-
# Configure NSG Flow Logs from an Azure Resource Manager template
15+
# Manage network security group flow logs using an Azure Resource Manager template
1616

1717
> [!div class="op_single_selector"]
1818
> - [Azure portal](network-watcher-nsg-flow-logging-portal.md)
@@ -63,7 +63,7 @@ For a complete overview of the properties, you may read the [NSG Flow Logs templ
6363
To create a Microsoft.Network/networkWatchers/flowLogs resource, add the above JSON to the resources section of your template.
6464

6565

66-
## Creating your template
66+
## Create your template
6767

6868
If you are using Azure Resource Manager templates for the first time, you can learn more about them using the links below.
6969

@@ -143,7 +143,7 @@ Below are two examples of complete templates to set up NSG Flow Logs.
143143
}
144144
```
145145

146-
## Deploying your Azure Resource Manager template
146+
## Deploy your Azure Resource Manager template
147147

148148
This tutorial assumes you have an existing Resource group and an NSG you can enable Flow logging on.
149149
You can save any of the above example templates locally as `azuredeploy.json`. Update the property values so that they point to valid resources in your subscription.
@@ -160,11 +160,11 @@ New-AzResourceGroupDeployment -Name EnableFlowLog -ResourceGroupName NetworkWatc
160160
> The above commands are deploying a resource to the NetworkWatcherRG resource group and not the resource group containing the NSG
161161
162162

163-
## Verifying your deployment
163+
## Verify your deployment
164164

165165
There are a couple of ways to check if your deployment has Succeeded. Your PowerShell console should show "ProvisioningState" as "Succeeded". Additionally, you can visit the [NSG Flow Logs portal page](https://portal.azure.com/#blade/Microsoft_Azure_Network/NetworkWatcherMenuBlade/flowLogs) to confirm your changes. If there were issues with the deployment, take a look at [Troubleshoot common Azure deployment errors with Azure Resource Manager](../azure-resource-manager/templates/common-deployment-errors.md).
166166

167-
## Deleting your resource
167+
## Delete your resource
168168
Azure enables resource deletion through the "Complete" deployment mode. To delete a Flow Logs resource, specify a deployment in Complete mode without including the resource you wish to delete. Read more about the [Complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode)
169169

170170
## Next steps

articles/network-watcher/network-watcher-nsg-flow-logging-cli.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Manage NSG Flow logs - Azure CLI
2+
title: Manage NSG flow logs - Azure CLI
33
titleSuffix: Azure Network Watcher
4-
description: This page explains how to manage Network Security Group Flow logs in Azure Network Watcher with Azure CLI
4+
description: Learn how to manage network security group flow logs in Azure Network Watcher using the Azure CLI.
55
services: network-watcher
66
author: halkazwini
77
ms.service: network-watcher
@@ -12,8 +12,7 @@ ms.author: halkazwini
1212
ms.custom: engagement-fy23
1313
---
1414

15-
16-
# Configuring Network Security Group Flow logs with Azure CLI
15+
# Manage network security group flow logs using the Azure CLI
1716

1817
> [!div class="op_single_selector"]
1918
> - [Azure portal](network-watcher-nsg-flow-logging-portal.md)

articles/network-watcher/network-watcher-nsg-flow-logging-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage NSG flow logs - Azure PowerShell
33
titleSuffix: Azure Network Watcher
4-
description: This page explains how to manage network security group flow logs in Azure Network Watcher using Azure PowerShell.
4+
description: Learn how to manage network security group flow logs in Azure Network Watcher using Azure PowerShell.
55
author: halkazwini
66
ms.service: network-watcher
77
ms.topic: how-to
@@ -11,7 +11,7 @@ ms.author: halkazwini
1111
ms.custom: devx-track-azurepowershell, engagement-fy23
1212
---
1313

14-
# Configure network security group flow logs using Azure PowerShell
14+
# Manage network security group flow logs using Azure PowerShell
1515

1616
> [!div class="op_single_selector"]
1717
> - [Azure portal](network-watcher-nsg-flow-logging-portal.md)

articles/network-watcher/network-watcher-nsg-flow-logging-rest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage NSG flow logs - Azure REST API
33
titleSuffix: Azure Network Watcher
4-
description: This page explains how to manage Network Security Group flow logs in Azure Network Watcher with REST API
4+
description: Learn how to manage network security group flow logs in Azure Network Watcher using REST API.
55
services: network-watcher
66
author: halkazwini
77
ms.service: network-watcher
@@ -12,7 +12,7 @@ ms.author: halkazwini
1212
ms.custom: engagement-fy23
1313
---
1414

15-
# Configure network security group flow logs using REST API
15+
# Manage network security group flow logs using REST API
1616

1717
> [!div class="op_single_selector"]
1818
> - [Azure portal](network-watcher-nsg-flow-logging-portal.md)

articles/network-watcher/nsg-flow-logs-policy-portal.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,25 @@
11
---
2-
title: QuickStart - Deploy and manage NSG Flow Logs using Azure Policy
2+
title: Deploy and manage NSG flow logs using Azure Policy
33
titleSuffix: Azure Network Watcher
4-
description: This article explains how to use the built-in policies to manage the deployment of NSG flow logs
4+
description: Learn how to use built-in policies to manage the deployment of network security group (NSG) flow logs.
55
services: network-watcher
66
author: halkazwini
77
ms.service: network-watcher
8-
ms.topic: quickstart
8+
ms.topic: how-to
99
ms.workload: infrastructure-services
1010
ms.date: 02/09/2022
1111
ms.author: halkazwini
1212
ms.custom: engagement-fy23
1313
---
1414

15-
# QuickStart: Deploy and manage NSG Flow Logs using Azure Policy
15+
# Deploy and manage NSG flow logs using Azure Policy
1616

17-
## Overview
17+
Azure Policy helps to enforce organizational standards and to assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we'll use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
1818

19-
Azure Policy helps to enforce organizational standards and to assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we will use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
20-
21-
If you are creating an Azure Policy definition for the first time, you can read through:
19+
If you're creating an Azure Policy definition for the first time, you can read through:
2220
- [Azure Policy overview](../governance/policy/overview.md)
2321
- [Tutorial for creating an Azure Policy assignment](../governance/policy/assign-policy-portal.md#create-a-policy-assignment).
2422

25-
2623
## Locate the policies
2724

2825
1. Go to the Azure portal – [portal.azure.com](https://portal.azure.com)
@@ -35,11 +32,11 @@ Navigate to the Azure Policy page by searching for Policy in the top search bar
3532

3633
![Assignments Tab](./media/network-watcher-builtin-policy/2_assignments-tab.png)
3734

38-
3. Click on **Assign Policy** button
35+
3. Select **Assign Policy** button
3936

4037
![Assign Policy Button](./media/network-watcher-builtin-policy/3_assign-policy-button.png)
4138

42-
4. Click the three dots menu under "Policy Definitions" to see available policies
39+
4. Select the three dots menu under "Policy Definitions" to see available policies
4340

4441
5. Use the Type filter and choose "Built-in". Then search for "Flow log"
4542

@@ -57,7 +54,7 @@ There are separate instructions for each policy below.
5754

5855
### How the policy works
5956

60-
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property does not exist, the NSG is flagged.
57+
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is, it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property doesn't exist, the NSG is flagged.
6158

6259
If you want to see the full definition of the policy, you can visit the [Definitions tab](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyMenuBlade/Definitions) and search for "Flow logs" to find the policy
6360

@@ -69,9 +66,9 @@ If you want to see the full definition of the policy, you can visit the [Definit
6966
- Policy Definition: Should be chosen as shown in the "Locate the policies" section.
7067
- AssignmentName: Choose a descriptive name
7168

72-
2. Click on "Review + Create" to review your assignment
69+
2. Select "Review + Create" to review your assignment
7370

74-
The policy does not require any parameters. As you are assigning an audit policy, you do not need to fill in the details in the "Remediation" tab.
71+
The policy doesn't require any parameters. As you're assigning an audit policy, you don't need to fill in the details in the "Remediation" tab.
7572

7673
![Audit Policy Review](./media/network-watcher-builtin-policy/5_1_audit-policy-review.png)
7774

@@ -86,7 +83,7 @@ You should see something similar to the following screenshot once your policy ru
8683

8784
### Policy Structure
8885

89-
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property does not exist, the policy deploys a Flow log.
86+
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is, it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property doesn't exist, the policy deploys a Flow log.
9087

9188
If you want to see the full definition of the policy, you can visit the [Definitions tab](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyMenuBlade/Definitions) and search for "Flow logs" to find the policy.
9289

@@ -103,7 +100,7 @@ If you want to see the full definition of the policy, you can visit the [Definit
103100
The Network Watcher service is a regional service. These parameters allow the policy action of deploying flow logs to be executed.
104101
- NSG Region: Azure regions at which the policy is targeted
105102
- Storage ID: Full resource ID of the storage account. Note: This storage account should be in the same region as the NSG.
106-
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you have not renamed it, you can enter `NetworkWatcherRG` which is the default.
103+
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you haven't renamed it, you can enter `NetworkWatcherRG` which is the default.
107104
- Network Watcher name: Name of the regional network watcher service. Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centralus. See the full list.
108105

109106
![DINE Policy parameters](./media/network-watcher-builtin-policy/5_2_1_dine-policy-details-alt.png)
@@ -113,11 +110,11 @@ The Network Watcher service is a regional service. These parameters allow the po
113110
- Check mark on **Create Remediation task** if you want the policy to affect existing resources
114111
- **Create a Managed Identity** should be already checked
115112
- Select the same location as previous for your Managed Identity
116-
- You will need Contributor or Owner permission to use this policy. If you have these permissions, you should not see any errors.
113+
- You'll need Contributor or Owner permission to use this policy. If you have these permissions, you shouldn't see any errors.
117114

118115
![DINE Policy remediation](./media/network-watcher-builtin-policy/5_2_2_dine-remediation.png)
119116

120-
4. Click on "Review + Create" to review your assignment
117+
4. Select "Review + Create" to review your assignment
121118
You should see something similar to the following screenshot.
122119

123120
![DINE Policy review](./media/network-watcher-builtin-policy/5_2_3_dine-review.png)
@@ -135,4 +132,4 @@ You should see something like the following screenshot once your policy. In case
135132

136133
- Learn about [Traffic Analytics Built-in Policies](./traffic-analytics-policy-portal.md)
137134
- Use this [tutorial](./quickstart-configure-network-security-group-flow-logs-from-arm-template.md) Go deeper by using ARM templates to deploy Flow Logs and Traffic Analytics.
138-
- Learn more about [Network Watcher](./index.yml)
135+
- Learn more about [Network Watcher](./index.yml)

articles/network-watcher/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@
153153
href: network-watcher-using-open-source-tools.md
154154
- name: Flow log traffic monitoring
155155
items:
156-
- name: Configure NSG flow logs
156+
- name: Manage NSG flow logs
157157
items:
158158
- name: PowerShell
159159
href: network-watcher-nsg-flow-logging-powershell.md

0 commit comments

Comments
 (0)