Skip to content

Commit 89c88a9

Browse files
Merge pull request #302465 from sujamiya/fix/policy-overview-doc
Update Azure Firewall Manager policy overview documentation
2 parents 66e6db9 + fc0bbeb commit 89c88a9

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

articles/firewall-manager/policy-overview.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Azure Firewall Manager policy overview
33
description: Learn about Azure Firewall Manager policies.
4-
author: duongau
4+
author: sujamiya
55
ms.service: azure-firewall-manager
66
services: firewall-manager
77
ms.topic: concept-article
8-
ms.date: 03/06/2024
9-
ms.author: duau
8+
ms.date: 07/09/2025
9+
ms.author: sujamiya
1010
---
1111

1212
# Azure Firewall Manager policy overview
@@ -21,7 +21,7 @@ A policy can be created and managed in multiple ways, including the Azure portal
2121

2222
You can also migrate existing Classic rules from Azure Firewall using the portal or Azure PowerShell to create policies. For more information, see [How to migrate Azure Firewall configurations to Azure Firewall policy](migrate-to-policy.md).
2323

24-
Policies can be associated with one or more virtual hubs or VNets. The firewall can be in any subscription associated with your account and in any region.
24+
Policies can be associated with one or more firewalls deployed in either a Virtual WAN (creating a Secured Virtual Hub) or a Virtual Network (creating a Hub Virtual Network). Firewalls can reside in any region or subscription linked to your account.
2525

2626
## Classic rules and policies
2727

@@ -31,7 +31,7 @@ Azure Firewall supports both Classic rules and policies, but policies is the rec
3131
| Subject | Policy | Classic rules |
3232
| ------- | ------- | ----- |
3333
|Contains |NAT, Network, Application rules, custom DNS and DNS proxy settings, IP Groups, and Threat Intelligence settings (including allowlist), IDPS, TLS Inspection, Web Categories, URL Filtering|NAT, Network, and Application rules, custom DNS and DNS proxy settings, IP Groups, and Threat Intelligence settings (including allowlist)|
34-
|Protects |Virtual hubs and Virtual Networks|Virtual Networks only|
34+
|Protects |Virtual Hubs (VWAN) and Virtual Networks|Virtual Networks only|
3535
|Portal experience |Central management using Firewall Manager|Standalone firewall experience|
3636
|Multiple firewall support |Firewall Policy is a separate resource that can be used across firewalls|Manually export and import rules, or using third-party management solutions |
3737
|Pricing |Billed based on firewall association. See [Pricing](#pricing).|Free|
@@ -51,17 +51,19 @@ Azure Firewall supports Basic, Standard, and Premium policies. The following tab
5151

5252
## Hierarchical policies
5353

54-
New policies can be created from scratch or inherited from existing policies. Inheritance allows DevOps to create local firewall policies on top of organization mandated base policy.
54+
New firewall policies can either be created from scratch or inherited from existing policies. Inheritance allows DevOps to define local firewall policies on top of organization mandated base policies.
5555

56-
Policies created with non-empty parent policies inherit all rule collections from the parent policy. The parent policy and the child policy must be in the same region. A firewall policy can be associated with firewalls across regions regardless where they're stored.
56+
When a new policy is created with a non-empty parent policy, it inherits all rule collections from the parent. Both the parent and child policies must reside in the same region. However, a firewall policy, regardless of where it is stored, can be associated with firewalls in any region.
5757

58-
Network rule collections inherited from a parent policy are always prioritized over network rule collections defined as part of a new policy. The same logic also applies to application rule collections. However, network rule collections are always processed before application rule collections regardless of inheritance.
58+
### Rule inheritance ###
59+
Network rule collections inherited from the parent policy are always prioritized over network rule collections defined as part of a new policy. The same logic also applies to application rule collections. Regardless of inheritance, network rule collections are processed before application rule collections.
5960

60-
Threat Intelligence mode is also inherited from the parent policy. You can set your threat Intelligence mode to a different value to override this behavior, but you can't turn it off. It's only possible to override with a stricter value. For example, if your parent policy is set to **Alert only**, you can configure this local policy to **Alert and deny**.
61+
NAT rule collections are not inherited, as they are specific to individual firewalls. If you want to use NAT rules, you must define them in the child policy.
6162

62-
Like Threat Intelligence mode, the Threat Intelligence allowlist is inherited from the parent policy. The child policy can add more IP addresses to the allowlist.
63+
### Threat Intelligence mode and allowlist inheritance ###
64+
Threat Intelligence mode is also inherited from the parent policy. While you can override this setting in the child policy, it must be with a stricter mode - you cannot disable it. For example, if your parent policy is set to **Alert only**, the child policy can be set to **Alert and deny**, but not to a less strict mode.
6365

64-
NAT rule collections aren't inherited because they're specific to a given firewall.
66+
Similarly, the Threat Intelligence allowlist is inherited from the parent policy, and the child policy can append additional IP addresses to this list.
6567

6668
With inheritance, any changes to the parent policy are automatically applied down to associated firewall child policies.
6769

0 commit comments

Comments
 (0)