Skip to content

Commit 7457506

Browse files
Merge pull request #239618 from halkazwini/nw-nsg-policy3
add screenshot
2 parents 3206974 + ece150a commit 7457506

File tree

2 files changed

+15
-11
lines changed

2 files changed

+15
-11
lines changed
Loading

articles/network-watcher/nsg-flow-logs-policy-portal.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: Manage NSG flow logs by using Azure Policy
2+
title: Manage NSG flow logs using Azure Policy
33
titleSuffix: Azure Network Watcher
4-
description: Learn how to use built-in policies to audit network security groups and deploy Azure Network Watcher NSG flow logs.
4+
description: Learn how to use Azure Policy built-in policies to audit network security groups and deploy Azure Network Watcher NSG flow logs.
55
services: network-watcher
66
author: halkazwini
77
ms.service: network-watcher
88
ms.topic: how-to
9-
ms.date: 04/30/2023
9+
ms.date: 05/30/2023
1010
ms.author: halkazwini
1111
ms.custom: template-how-to, engagement-fy23
1212
---
1313

14-
# Manage NSG flow logs by using Azure Policy
14+
# Manage NSG flow logs using Azure Policy
1515

1616
Azure Policy helps you enforce organizational standards and assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. To learn more about Azure policy, see [What is Azure Policy?](../governance/policy/overview.md) and [Quickstart: Create a policy assignment to identify non-compliant resources](../governance/policy/assign-policy-portal.md).
1717

1818
In this article, you learn how to use two built-in policies to manage your setup of network security group (NSG) flow logs. The first policy flags any network security group that doesn't have flow logs enabled. The second policy automatically deploys NSG flow logs that don't have flow logs enabled.
1919

20-
## Audit network security groups by using a built-in policy
20+
## Audit network security groups using a built-in policy
2121

2222
The **Flow logs should be configured for every network security group** policy audits all existing network security groups in a scope by checking all Azure Resource Manager objects of type `Microsoft.Network/networkSecurityGroups`. This policy then checks for linked flow logs via the flow logs property of the network security group, and it flags any network security group that doesn't have flow logs enabled.
2323

24-
To audit your flow logs by using the built-in policy:
24+
To audit your flow logs using the built-in policy:
2525

2626
1. Sign in to the [Azure portal](https://portal.azure.com).
2727

@@ -55,9 +55,9 @@ To audit your flow logs by using the built-in policy:
5555

5656
1. Select **Resource compliance** to get a list of all non-compliant network security groups.
5757

58-
:::image type="content" source="./media/nsg-flow-logs-policy-portal/audit-policy-compliance-details.png" alt-text="Screenshot of the page for audit policy compliance in the Azure portal." lightbox="./media/nsg-flow-logs-policy-portal/audit-policy-compliance-details.png":::
58+
:::image type="content" source="./media/nsg-flow-logs-policy-portal/audit-policy-compliance-details.png" alt-text="Screenshot of the Policy compliance page that shows the noncompliant resources based on the audit policy." lightbox="./media/nsg-flow-logs-policy-portal/audit-policy-compliance-details.png":::
5959

60-
## Deploy and configure NSG flow logs by using a built-in policy
60+
## Deploy and configure NSG flow logs using a built-in policy
6161

6262
The **Deploy a flow log resource with target network security group** policy checks all existing network security groups in a scope by checking all Azure Resource Manager objects of type `Microsoft.Network/networkSecurityGroups`. It then checks for linked flow logs via the flow logs property of the network security group. If the property doesn't exist, the policy deploys a flow log.
6363

@@ -103,7 +103,7 @@ To assign the *deployIfNotExists* policy:
103103
| **Create a remediation task** | Select the checkbox if you want the policy to affect existing resources. |
104104
| **Create a Managed Identity** | Select the checkbox. |
105105
| **Type of Managed Identity** | Select the type of managed identity that you want to use. |
106-
| **System assigned identity location** | Select the region of your system-assigned identity. |
106+
| **System assigned identity location** | Select the region of your system assigned identity. |
107107
| **Scope** | Select the scope of your user-assigned identity. |
108108
| **Existing user assigned identities** | Select your user-assigned identity. |
109109

@@ -120,10 +120,14 @@ To assign the *deployIfNotExists* policy:
120120

121121
1. Select **Resource compliance** to get a list of all non-compliant network security groups.
122122

123-
:::image type="content" source="./media/nsg-flow-logs-policy-portal/deploy-policy-compliance-details.png" alt-text="Screenshot of the page for deployment policy compliance in the Azure portal." lightbox="./media/nsg-flow-logs-policy-portal/deploy-policy-compliance-details.png":::
123+
:::image type="content" source="./media/nsg-flow-logs-policy-portal/deploy-policy-compliance-details.png" alt-text="Screenshot of the Policy compliance page that shows the noncompliant resources." lightbox="./media/nsg-flow-logs-policy-portal/deploy-policy-compliance-details.png":::
124+
125+
1. Leave the policy runs to evaluate and deploy flow logs for all non-compliant network security groups. Then select **Resource compliance** again to check the status of network security groups (you don't see noncompliant network security groups if the policy completed its remediation).
126+
127+
:::image type="content" source="./media/nsg-flow-logs-policy-portal/deploy-policy-compliance-details-compliant-resources.png" alt-text="Screenshot of the Policy compliance page that shows all resources are compliant." lightbox="./media/nsg-flow-logs-policy-portal/deploy-policy-compliance-details-compliant-resources.png":::
124128

125129
## Next steps
126130

127131
- To learn more about NSG flow logs, see [Flow logs for network security groups](./network-watcher-nsg-flow-logging-overview.md).
128132
- To learn about using built-in policies with traffic analytics, see [Manage traffic analytics using Azure Policy](./traffic-analytics-policy-portal.md).
129-
- To learn how to use an Azure Resource Manager template (ARM template) to deploy flow logs and traffic analytics, see [Configure NSG flow logs using an Azure Resource Manager template](./quickstart-configure-network-security-group-flow-logs-from-arm-template.md).
133+
- To learn how to use an Azure Resource Manager (ARM) template to deploy flow logs and traffic analytics, see [Configure NSG flow logs using an Azure Resource Manager template](./quickstart-configure-network-security-group-flow-logs-from-arm-template.md).

0 commit comments

Comments
 (0)