Skip to content

Commit 976fbd8

Browse files
authored
Merge pull request #225096 from vhorne/fw-logging
move Network rule name logging and link back
2 parents 42c7d6e + 65c8836 commit 976fbd8

File tree

3 files changed

+56
-22
lines changed

3 files changed

+56
-22
lines changed
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Azure network rule name logging (preview)
3+
description: Learn about Azure network rule name logging (preview)
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: conceptual
8+
ms.date: 01/25/2023
9+
ms.author: victorh
10+
---
11+
12+
# Azure network rule name logging (preview)
13+
14+
15+
> [!IMPORTANT]
16+
> This feature is currently in PREVIEW.
17+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18+
19+
Currently, a network rule hit event shows the following attributes in the logs:
20+
21+
- Source and destination IP/port
22+
- Action (allow, or deny)
23+
24+
With this new feature, the event logs for network rules also show the following attributes:
25+
- Policy name
26+
- Rule collection group
27+
- Rule collection
28+
- Rule name
29+
30+
## Enable/disable network rule name logging
31+
32+
To enable the Network Rule name Logging feature, the following commands need to be run in Azure PowerShell. For the feature to immediately take effect, an operation needs to be run on the firewall. This operation can be a rule change (least intrusive), a setting change, or a stop/start operation. Otherwise, the firewall/s is updated with the feature within several days.
33+
34+
Run the following Azure PowerShell commands to configure Azure Firewall network rule name logging:
35+
36+
```azurepowershell
37+
Connect-AzAccount
38+
Select-AzSubscription -Subscription "subscription_id or subscription_name"
39+
Register-AzProviderFeature -FeatureName AFWEnableNetworkRuleNameLogging -ProviderNamespace Microsoft.Network
40+
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
41+
```
42+
43+
Run the following Azure PowerShell command to turn off this feature:
44+
45+
```azurepowershell
46+
Unregister-AzProviderFeature -FeatureName AFWEnableNetworkRuleNameLogging -ProviderNamespace Microsoft.Network
47+
```
48+
49+
## Next steps
50+
51+
52+
- To learn more about Azure Firewall logs and metrics, see [Azure Firewall logs and metrics](logs-and-metrics.md)

articles/firewall/firewall-preview.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -29,33 +29,13 @@ The following features are available in preview.
2929

3030
### Network rule name logging (preview)
3131

32-
Currently, a network rule hit event shows the following attributes in the logs:
33-
34-
- Source and destination IP/port
35-
- Action (allow, or deny)
36-
37-
With this new feature, the event logs for network rules also show the following attributes:
32+
With this new feature, the event logs for network rules adds the following attributes:
3833
- Policy name
3934
- Rule collection group
4035
- Rule collection
4136
- Rule name
4237

43-
To enable the Network Rule name Logging feature, the following commands need to be run in Azure PowerShell. For the feature to immediately take effect, an operation needs to be run on the firewall. This can be a rule change (least intrusive), a setting change, or a stop/start operation. Otherwise, the firewall/s is updated with the feature within several days.
44-
45-
Run the following Azure PowerShell commands to configure Azure Firewall network rule name logging:
46-
47-
```azurepowershell
48-
Connect-AzAccount
49-
Select-AzSubscription -Subscription "subscription_id or subscription_name"
50-
Register-AzProviderFeature -FeatureName AFWEnableNetworkRuleNameLogging -ProviderNamespace Microsoft.Network
51-
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
52-
```
53-
54-
Run the following Azure PowerShell command to turn off this feature:
55-
56-
```azurepowershell
57-
Unregister-AzProviderFeature -FeatureName AFWEnableNetworkRuleNameLogging -ProviderNamespace Microsoft.Network
58-
```
38+
For more information, see [Azure network rule name logging (preview)](firewall-network-rule-logging.md).
5939

6040
### Structured Firewall Logs (preview)
6141

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,8 @@ items:
6767
href: logs-and-metrics.md
6868
- name: Structured Firewall Logs
6969
href: firewall-structured-logs.md
70+
- name: Network rule name logging
71+
href: firewall-network-rule-logging.md
7072
- name: Threat intelligence
7173
href: threat-intel.md
7274
- name: Policy rule sets

0 commit comments

Comments
 (0)