Skip to content

Commit 9a6cbaa

Browse files
authored
Merge pull request #223533 from mbender-ms/avnm-update-sec-config-dropdown
AVNM - Update step for Configuration dropdown
2 parents 39cae17 + bab9e8e commit 9a6cbaa

File tree

7 files changed

+22
-23
lines changed

7 files changed

+22
-23
lines changed

articles/virtual-network-manager/create-virtual-network-manager-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: quickstart
8-
ms.date: 09/22/2022
8+
ms.date: 01/10/2023
99
ms.custom: template-quickstart, ignite-fall-2022, mode-ui
1010
---
1111

@@ -167,7 +167,7 @@ Now that the Network Group is created, and has the correct VNets, create a mesh
167167

168168
1. Select **Connectivity configuration** from the drop-down menu to begin creating a connectivity configuration.
169169

170-
:::image type="content" source="./media/create-virtual-network-manager-portal/configuration-menu.png" alt-text="Screenshot of configuration drop-down menu.":::
170+
:::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration-dropdown.png" alt-text="Screenshot of configuration drop-down menu.":::
171171

172172
1. On the **Basics** page, enter the following information, and select **Next: Topology >**.
173173

articles/virtual-network-manager/how-to-block-high-risk-ports.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: how-to #Required; leave this attribute/value as-is.
8-
ms.date: 06/28/2022
8+
ms.date: 01/10/2023
99
ms.custom: template-how-to #Required; leave this attribute/value as-is.
1010
---
1111
# Protect high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
1212

1313

14-
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
14+
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet using network security groups.
1515

16-
While this article focuses on a single port, SSH, you can use protect any high-risk ports in your environment with the same steps. To learn more, review this list of [high risk ports](concept-security-admins.md#protect-high-risk-ports)
16+
While this article focuses on a single port, SSH, you can protect any high-risk ports in your environment with the same steps. To learn more, review this list of [high risk ports](concept-security-admins.md#protect-high-risk-ports)
1717

1818
> [!IMPORTANT]
1919
> Azure Virtual Network Manager is currently in public preview.
@@ -26,8 +26,7 @@ While this article focuses on a single port, SSH, you can use protect any high-r
2626
* A group of virtual networks that can be split into network groups for applying granular security admin rules.
2727

2828
## Deploy virtual network environment
29-
30-
For this how-to, you'll need a virtual network environment that includes virtual networks that can be segregated for allowing and blocking specific network traffic. You may use the following table or your own configuration of virtual networks:
29+
You'll need a virtual network environment that includes virtual networks that can be segregated for allowing and blocking specific network traffic. You may use the following table or your own configuration of virtual networks:
3130

3231
| Name | IPv4 address space | subnet |
3332
| ---- | ----| ---- |
@@ -66,7 +65,7 @@ In this section, you'll deploy a Virtual Network Manager instance with the Secur
6665

6766
## Create a network group
6867

69-
With your virtual network manager created, you now create a network group to encapsulate the VNets you want to protect. This will include all of the VNets in the organization as a general all-encompassing rule to block high risk network ports is needed. You'll manually add all of the VNets.
68+
With your virtual network manager created, you now create a network group containing all of the VNets in the organization. You'll manually add all of the VNets.
7069
1. Select **Network Groups**, under **Settings**.
7170
1. Select **+ Create**, enter a *name* for the network group, and select **Add**.
7271
1. On the *Network groups* page, select the network group you created.
@@ -82,9 +81,9 @@ It’s time to construct our security admin rules within a configuration in orde
8281

8382
:::image type="content" source="./media/create-virtual-network-manager-portal/add-configuration.png" alt-text="Screenshot of add a security admin configuration.":::
8483

85-
1. Select **Security admin configuration** from the drop-down menu.
84+
1. Select **Security configuration** from the drop-down menu.
8685

87-
:::image type="content" source="./media/how-to-block-network-traffic-portal/security-admin-drop-down.png" alt-text="Screenshot of add a configuration drop-down.":::
86+
:::image type="content" source="./media/create-virtual-network-manager-portal/security-admin-dropdown.png" alt-text="Screenshot of add a configuration drop-down.":::
8887

8988
1. On the **Basics** tab, enter a *Name* to identify this security configuration and select **Next: Rule collections**.
9089

@@ -136,7 +135,7 @@ In this section, you define the security rule to block high-risk network traffic
136135
1. Then select **Review + Create** and **Create** to complete the security configuration.
137136
## Deploy a security admin configuration
138137

139-
In this section, you deploy the newly created security admin configuration to block high-risk ports to your network group. This is how the security admin configuration will take effect on the virtual networks included in the network group
138+
In this section, the rules created will take effect when you deploy the security admin configuration.
140139

141140
1. Select **Deployments** under *Settings*, then select **Deploy configuration**.
142141

@@ -149,7 +148,7 @@ In this section, you deploy the newly created security admin configuration to bl
149148
1. Select **Next** and **Deploy** to deploy the security admin configuration.
150149
## Create a network group for exception virtual networks
151150

152-
With traffic blocked across all of your VNets, you need an exception to allow traffic to specific virtual networks. To do this, you'll create a network group specifically for the VNets needing exclusion from the other security admin rule above.
151+
With traffic blocked across all of your VNets, you need an exception to allow traffic to specific virtual networks. You'll create a network group specifically for the VNets needing exclusion from the other security admin rule.
153152

154153
1. From your virtual network manager, select **Network Groups**, under **Settings**.
155154
1. Select **+ Create**, enter a *name* for the application network group, and select **Add**.
@@ -162,7 +161,7 @@ With traffic blocked across all of your VNets, you need an exception to allow tr
162161

163162
## Create an exception Security Admin Rule collection and Rule
164163

165-
In this section, you create a new rule collection that will allow high-risk traffic to a subset of virtual networks you've defined in a network group, and create security admin rule to add to our existing security admin configuration.
164+
In this section, you create a new rule collection and security admin rule that will allow high-risk traffic to the subset of virtual networks you've defined as exceptions. Next, you'll add it to your existing security admin configuration.
166165

167166
> [!IMPORTANT]
168167
> In order for your security admin rule to allow traffic to your application virtual networks, the priority needs to be set to a **lower number** than existing rules blocking traffic.

articles/virtual-network-manager/how-to-block-network-traffic-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: how-to
8-
ms.date: 07/01/2022
8+
ms.date: 01/10/2023
99
ms.custom: template-how-to, ignite-fall-2021
1010
---
1111

@@ -31,9 +31,9 @@ Before you start to configure security admin rules, confirm that you've done the
3131

3232
:::image type="content" source="./media/create-virtual-network-manager-portal/add-configuration.png" alt-text="Screenshot of add a security admin configuration.":::
3333

34-
1. Select **Security admin configuration** from the drop-down menu.
34+
1. Select **Security configuration** from the drop-down menu.
3535

36-
:::image type="content" source="./media/how-to-block-network-traffic-portal/security-admin-drop-down.png" alt-text="Screenshot of add a configuration drop-down.":::
36+
:::image type="content" source="./media/create-virtual-network-manager-portal/security-admin-dropdown.png" alt-text="Screenshot of add a configuration drop-down.":::
3737

3838
1. On the **Basics** tab, enter a *Name* to identify this security configuration and select **Next: Rule collections**.
3939

@@ -68,7 +68,7 @@ Before you start to configure security admin rules, confirm that you've done the
6868
| Source IP addresses | This field will appear when you select the source type of *IP address*. Enter an IPv4 or IPv6 address or a range using CIDR notation. When defining more than one address or blocks of addresses separate using a comma. Leave blank for this example.|
6969
| Source service tag | This field will appear when you select the source type of *Service tag*. Select service tag(s) for services you want to specify as the source. See [Available service tags](../virtual-network/service-tags-overview.md#available-service-tags), for the list of supported tags. |
7070
| Source port | Enter a single port number or a port range such as (1024-65535). When defining more than one port or port ranges, separate them using a comma. To specify any port, enter *. Leave blank for this example.|
71-
|**Desination**| |
71+
|**Destination**| |
7272
| Destination type | Select the destination type of either **IP address** or **Service tags**. |
7373
| Destination IP addresses | This field will appear when you select the destination type of *IP address*. Enter an IPv4 or IPv6 address or a range using CIDR notation. When defining more than one address or blocks of addresses separate using a comma. |
7474
| Destination service tag | This field will appear when you select the destination type of *Service tag*. Select service tag(s) for services you want to specify as the destination. See [Available service tags](../virtual-network/service-tags-overview.md#available-service-tags), for the list of supported tags. |

articles/virtual-network-manager/how-to-create-hub-and-spoke.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: how-to
8-
ms.date: 11/02/2021
8+
ms.date: 1/10/2023
99
ms.custom: template-concept, ignite-fall-2021
1010
---
1111

@@ -79,9 +79,9 @@ This section will guide you through how to create a hub-and-spoke configuration
7979

8080
:::image type="content" source="./media/how-to-create-hub-and-spoke/configuration-list.png" alt-text="Screenshot of the configurations list.":::
8181

82-
1. Select **Connectivity** from the drop-down menu.
82+
1. Select **Connectivity configuration** from the drop-down menu to begin creating a connectivity configuration.
8383

84-
:::image type="content" source="./media/create-virtual-network-manager-portal/configuration-menu.png" alt-text="Screenshot of configuration drop-down menu.":::
84+
:::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration-dropdown.png" alt-text="Screenshot of configuration drop-down menu.":::
8585

8686
1. On the *Add a connectivity configuration* page, enter, or select the following information:
8787

Loading
19.3 KB
Loading

articles/virtual-network-manager/tutorial-create-secured-hub-and-spoke.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: tutorial
8-
ms.date: 09/21/2022
9-
ms.custom: ignite-fall-2021
8+
ms.date: 01/10/2023
9+
ms.custom: ignite-fall-2021, FY23 content-maintenance
1010
---
1111

1212
# Tutorial: Create a secured hub and spoke network
@@ -150,7 +150,7 @@ Deploy a virtual network gateway into the hub virtual network. This virtual netw
150150

151151
1. Select **Configuration** under *Settings*, then select **+ Add a configuration**. Select **Connectivity** from the drop-down menu.
152152

153-
:::image type="content" source="./media/tutorial-create-secured-hub-and-spoke/add-configuration.png" alt-text="Screenshot of add a configuration button for Network Manager.":::
153+
:::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration-dropdown.png" alt-text="Screenshot of configuration drop-down menu.":::
154154

155155
1. On the **Basics** tab, enter and select the following information for the connectivity configuration:
156156

0 commit comments

Comments
 (0)