Skip to content

Commit 5ea365f

Browse files
authored
Merge pull request #94100 from vhorne/fw-threat-intel
Remove preview from Threat Intel go live at Ignite
2 parents 3a02fe2 + 1c52714 commit 5ea365f

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

articles/firewall/threat-intel.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,17 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 3/11/2019
8+
ms.date: 11/05/2019
99
ms.author: victorh
1010
---
1111

12-
# Azure Firewall threat intelligence-based filtering - Public Preview
12+
# Azure Firewall threat intelligence-based filtering
1313

1414
Threat intelligence-based filtering can be enabled for your firewall to alert and deny traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed. [Intelligent Security Graph](https://www.microsoft.com/en-us/security/operations/intelligence) powers Microsoft threat intelligence and is used by multiple services including Azure Security Center.
1515

1616
![Firewall threat intelligence](media/threat-intel/firewall-threat.png)
1717

18-
> [!IMPORTANT]
19-
> Threat intelligence based filtering is currently in public preview and is provided with a preview service level agreement. Certain features may not be supported or may have constrained capabilities. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for details.
20-
21-
If threat intelligence-based filtering is enabled, the associated rules are processed before any of the NAT rules, network rules, or application rules. During the preview, only highest confidence records are included.
18+
If you've enabled threat intelligence-based filtering, the associated rules are processed before any of the NAT rules, network rules, or application rules.
2219

2320
You can choose to just log an alert when a rule is triggered, or you can choose alert and deny mode.
2421

@@ -46,7 +43,7 @@ The following log excerpt shows a triggered rule:
4643

4744
- **Outbound testing** - Outbound traffic alerts should be a rare occurrence, as it means that your environment has been compromised. To help test outbound alerts are working, a test FQDN has been created that triggers an alert. Use **testmaliciousdomain.eastus.cloudapp.azure.com** for your outbound tests.
4845

49-
- **Inbound testing** - You can expect to see alerts on incoming traffic if DNAT rules are configured on the firewall. This is true even if only specific sources are allowed on the DNAT rule and traffic is otherwise denied. Azure Firewall does not alert on all known port scanners; only on scanners that are known to also engage in malicious activity.
46+
- **Inbound testing** - You can expect to see alerts on incoming traffic if DNAT rules are configured on the firewall. This is true even if only specific sources are allowed on the DNAT rule and traffic is otherwise denied. Azure Firewall doesn't alert on all known port scanners; only on scanners that are known to also engage in malicious activity.
5047

5148
## Next steps
5249

0 commit comments

Comments
 (0)