You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-adaptive-network-hardening.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Applying [network security groups (NSG)](https://docs.microsoft.com/azure/virtua
23
23
24
24
Adaptive Network Hardening provides recommendations to further harden the NSG rules. It uses a machine learning algorithm that factors in actual traffic, known trusted configuration, threat intelligence, and other indicators of compromise, and then provides recommendations to allow traffic only from specific IP/port tuples.
25
25
26
-
For example, let’s say the existing NSG rule is to allow traffic from 140.20.30.10/24 on port 22. The Adaptive Network Hardening’s recommendation, based on the analysis, would be to narrow the range and allow traffic from 140.23.30.10/29 – which is a narrower IP range, and deny all other traffic to that port.
26
+
For example, let's say the existing NSG rule is to allow traffic from 140.20.30.10/24 on port 22. The Adaptive Network Hardening's recommendation, based on the analysis, would be to narrow the range and allow traffic from 140.23.30.10/29 – which is a narrower IP range, and deny all other traffic to that port.
@@ -38,7 +38,7 @@ For example, let’s say the existing NSG rule is to allow traffic from 140.20.3
38
38
***Unscanned resources**: VMs that the Adaptive Network Hardening algorithm cannot be run on because of one of the following reasons:
39
39
***VMs are Classic VMs**: Only Azure Resource Manager VMs are supported.
40
40
***Not enough data is available**: In order to generate accurate traffic hardening recommendations, Security Center requires at least 30 days of traffic data.
41
-
***VM is not protected by ASC standard**: Only VMs that are set to Security Center’s Standard pricing tier are eligible for this feature.
41
+
***VM is not protected by ASC standard**: Only VMs that are set to Security Center's Standard pricing tier are eligible for this feature.
@@ -74,19 +74,19 @@ You may want to modify the parameters of a rule that has been recommended. For e
74
74
75
75
Some important guidelines for modifying an Adaptive Network Hardening rule:
76
76
77
-
* You can modify the parameters of “allow” rules only.
78
-
* You cannot change “allow” rules to become “deny” rules.
77
+
* You can modify the parameters of "allow" rules only.
78
+
* You cannot change "allow" rules to become "deny" rules.
79
79
80
80
> [!NOTE]
81
-
> Creating and modifying “deny” rules is done directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
81
+
> Creating and modifying "deny" rules is done directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
82
82
83
-
* A **Deny all traffic** rule is the only type of “deny” rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-rule)).
83
+
* A **Deny all traffic** rule is the only type of "deny" rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-rule)).
84
84
> [!NOTE]
85
-
> A **Deny all traffic** rule is recommended when, as a result of running the algorithm, Security Center does not identify traffic that should be allowed, based on the existing NSG configuration. Therefore, the recommended rule is to deny all traffic to the specified port. The name of this type of rule is displayed as “*System Generated*”. After enforcing this rule, its actual name in the NSG will be a string comprised of the protocol, traffic direction, “DENY”, and a random number.
85
+
> A **Deny all traffic** rule is recommended when, as a result of running the algorithm, Security Center does not identify traffic that should be allowed, based on the existing NSG configuration. Therefore, the recommended rule is to deny all traffic to the specified port. The name of this type of rule is displayed as "*System Generated*". After enforcing this rule, its actual name in the NSG will be a string comprised of the protocol, traffic direction, "DENY", and a random number.
86
86
87
87
*To modify an Adaptive Network Hardening rule:*
88
88
89
-
1. To modify some of the parameters of a rule, in the **Rules** tab, click on the three dots (...) at the end of the rule’s row, and click **Edit**.
89
+
1. To modify some of the parameters of a rule, in the **Rules** tab, click on the three dots (...) at the end of the rule's row, and click **Edit**.
@@ -103,10 +103,10 @@ Some important guidelines for modifying an Adaptive Network Hardening rule:
103
103
104
104
### Add a new rule <aname ="add-rule"> </a>
105
105
106
-
You can add an “allow” rule that was not recommended by Security Center.
106
+
You can add an "allow" rule that was not recommended by Security Center.
107
107
108
108
> [!NOTE]
109
-
> Only “allow” rules can be added here. If you want to add “deny” rules, you can do so directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
109
+
> Only "allow" rules can be added here. If you want to add "deny" rules, you can do so directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
110
110
111
111
*To add an Adaptive Network Hardening rule:*
112
112
@@ -130,7 +130,7 @@ When necessary, you can delete a recommended rule for the current session. For e
130
130
131
131
*To delete an Adaptive Network Hardening rule for your current session:*
132
132
133
-
1. In the **Rules** tab, click on the three dots (...) at the end of the rule’s row, and click **Delete**.
133
+
1. In the **Rules** tab, click on the three dots (...) at the end of the rule's row, and click **Delete**.
0 commit comments