Skip to content

Commit 8e80441

Browse files
committed
freshness review - March 2025
1 parent 622197a commit 8e80441

File tree

1 file changed

+19
-18
lines changed

1 file changed

+19
-18
lines changed

articles/firewall/service-tags.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,55 +5,56 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 08/31/2023
8+
ms.date: 03/17/2025
99
ms.author: duau
1010
ms.custom: devx-track-azurepowershell
1111
---
1212

1313
# Azure Firewall service tags
1414

15-
A service tag represents a group of IP address prefixes to help minimize complexity for security rule creation. You can’t create your own service tag, nor specify which IP addresses are included within a tag. Microsoft manages the address prefixes encompassed by the service tag, and automatically updates the service tag as addresses change.
15+
A service tag represents a group of IP address prefixes to simplify security rule creation. You cannot create your own service tag or specify which IP addresses are included. Microsoft manages and updates the address prefixes within the service tag automatically.
1616

17-
Azure Firewall service tags can be used in the network rules destination field. You can use them in place of specific IP addresses.
17+
Azure Firewall service tags can be used in the network rules destination field, replacing specific IP addresses.
1818

1919
## Supported service tags
2020

21-
Azure Firewall supports the following Service Tags to use in Azure Firewall Network rules:
21+
Azure Firewall supports the following service tags in network rules:
2222

2323
- Tags for various Microsoft and Azure services listed in [Virtual network service tags](../virtual-network/service-tags-overview.md#available-service-tags).
24-
- Tags for the required IP addresses of Office365 services, split by Office365 product and category. You must define the TCP/UDP ports in your rules. For more information, see [Use Azure Firewall to protect Office 365](protect-office-365.md).
24+
- Tags for required IP addresses of Office365 services, categorized by product and category. Define the TCP/UDP ports in your rules. For more information, see [Use Azure Firewall to protect Office 365](protect-office-365.md).
2525

2626
## Configuration
2727

28-
Azure Firewall supports configuration of service tags via PowerShell, Azure CLI, or the Azure portal.
28+
You can configure Azure Firewall service tags with PowerShell, Azure CLI, or the Azure portal.
2929

30-
### Configure via Azure PowerShell
30+
### Configure with Azure PowerShell
3131

32-
In this example, we are making a change to an Azure Firewall using classic rules. We must first get context to our previously created Azure Firewall instance.
32+
First, get the context of your existing Azure Firewall instance:
3333

34-
```Get the context to an existing Azure Firewall
34+
```powershell
3535
$FirewallName = "AzureFirewall"
3636
$ResourceGroup = "AzureFirewall-RG"
3737
$azfirewall = Get-AzFirewall -Name $FirewallName -ResourceGroupName $ResourceGroup
3838
```
3939

40-
Next, we must create a new rule. For the Destination, you can specify the text value of the service tag you wish to leverage, as mentioned previously.
40+
Next, create a new rule. For the Destination, specify the service tag text value:
4141

42-
````Create new Network Rules using Service Tags
42+
```powershell
4343
$rule = New-AzFirewallNetworkRule -Name "AllowSQL" -Description "Allow access to Azure Database as a Service (SQL, MySQL, PostgreSQL, Datawarehouse)" -SourceAddress "10.0.0.0/16" -DestinationAddress Sql -DestinationPort 1433 -Protocol TCP
4444
$ruleCollection = New-AzFirewallNetworkRuleCollection -Name "Data Collection" -Priority 1000 -Rule $rule -ActionType Allow
45-
````
45+
```
4646

47-
Next, we must update the variable containing our Azure Firewall definition with the new network rules we created.
47+
Update the Azure Firewall definition with the new network rules:
4848

49-
````Merge the new rules into our existing Azure Firewall variable
49+
```powershell
5050
$azFirewall.NetworkRuleCollections.add($ruleCollection)
51-
`````
51+
```
5252

53-
Last, we must commit the Network Rule changes to the running Azure Firewall instance.
54-
````Commit the changes to Azure
53+
Finally, commit the network rule changes to the running Azure Firewall instance:
54+
55+
```powershell
5556
Set-AzFirewall -AzureFirewall $azfirewall
56-
````
57+
```
5758

5859
## Next steps
5960

0 commit comments

Comments
 (0)