Skip to content

Commit b4b8b90

Browse files
committed
Update to TOC
1 parent 80bd9a7 commit b4b8b90

File tree

4 files changed

+18
-25
lines changed

4 files changed

+18
-25
lines changed

articles/virtual-network-manager/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,14 @@
3737
href: concept-remove-components-checklist.md
3838
- name: How-to guides
3939
items:
40-
- name: Block network traffic
40+
- name: Secure network traffic
4141
items:
42-
- name: Portal
42+
- name: Block network traffic - Portal
4343
href: how-to-block-network-traffic-portal.md
44-
- name: PowerShell
44+
- name: Block network traffic -PowerShell
4545
href: how-to-block-network-traffic-powershell.md
46+
- name: Protect high-risk network ports
47+
href: how-to-block-high-risk-ports.md
4648
- name: Create a network topology
4749
items:
4850
- name: Mesh

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ Based on the industry study and suggestions from Microsoft, below is what we rec
5959
Security admin rules are similar to NSG rules in structure and the parameters they intake, but as we’ve explored so far, they’re not the exact same construct. The first difference is intended audience – admin rules are intended to be used by network admins of a central governance team, thereby delegating NSG rules to individual application or service teams to further specify security as needed. With these intentions, admin rules were designed to have a higher priority than NSGs and therefore be evaluated before NSG rules. Admin rules also include an additional action type of “Always Allow”, which allows the specified traffic through to its intended destination and terminates further (and possibly conflicting) evaluation by NSGs rules. Admin rules are also applied not only to a network group’s existing VNets but also to newly provisioned resources, as described in the previous section. Admin rules are currently applied at the VNet level, whereas NSGs can be associated at the subnet and NIC level.
6060
Let’s boil down these differences and similarities:
6161

62-
| Target Audience | Applied On | Evaluation Order | Action Types | Parameters |
62+
| Rule Type | Target Audience | Applied On | Evaluation Order | Action Types | Parameters |
6363
| --- | ---- | ---- | ---- | ---- | ---- |
64-
| **Security Admin Rules** | Network admins, central governance team | Virtual networks | Higher priority | Allow, Deny, Always Allow | Priority, protocol, action, source, destination
65-
| **NSG Rules** | Individual teams | Subnets, NICs | Lower priority, after security admin rules | Allow, Deny |
64+
| **Security Admin Rules** | Network admins, central governance team | Virtual networks | Higher priority | Allow, Deny, Always Allow | Priority, protocol, action, source, destination |
65+
| **NSG Rules** | Individual teams | Subnets, NICs | Lower priority, after security admin rules | Allow, Deny | Priority, protocol, action, source, destination |
6666

6767
### The Order of Evaluation
6868

articles/virtual-network-manager/concept-why-admin-rules.md

Lines changed: 4 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Why Security Admin Rules?'
2+
title: 'Virtual network enforcement with Security Admin Rules?'
33
description: #Required; You'll learn why you should use Security Admin Rules and how they differ from NSGs.
44
author: mbender-ms
55
ms.author: mbender
@@ -8,16 +8,11 @@ ms.topic: conceptual #Required; leave this attribute/value as-is.
88
ms.date: 06/28/2022
99
ms.custom: template-concept #Required; leave this attribute/value as-is.
1010
---
11+
# Virtual network enforcement with Security Admin Rules?
1112

12-
<!-- reference of WHY doc: https://docs.microsoft.com/en-us/azure/applied-ai-services/why-applied-ai-services -->
13+
In this article, you'll learn how Security Admins Rules provide flexible and scalable enforcement of security policies over tools like network security groups. First, you learn the different models of virtual network enforcement. Then, you'll learn the general steps for enforcing security with security admin rules.
1314

14-
<!-- reference of WHAT doc: https://docs.microsoft.com/en-us/azure/applied-ai-services/what-are-applied-ai-services -->
15-
16-
# Why Security Admin Rules?
17-
18-
[add your introductory paragraph]
19-
20-
### Virtual network enforcement
15+
### Virtual network enforcement models
2116

2217
With NSGs alone, widespread enforcement on VNets across several applications, teams, or even entire organizations can be tricky. Often there’s a balancing act between attempts at centralized enforcement across an organization and handing over granular, flexible control to teams. Let’s look at a few common models of security management without security admin rules, and their pros and cons:
2318

@@ -57,10 +52,6 @@ After the deployment of the security admin configuration, all VNets in the compa
5752

5853
## When to use Security Admin Rules
5954

60-
<!-- 4. Next steps
61-
Required. Provide at least one next step and no more than three. Include some
62-
context so the customer can determine why they would click the link.
63-
-->
6455

6556
## Next steps
6657
<!-- Add a context sentence for the following links -->

articles/virtual-network-manager/how-to-block-high-risk-ports.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'How to block high-risk network ports with SecurityAdmin Rules in Azure Virtual Network Manager.'
2+
title: 'Protect high-risk network ports with SecurityAdmin Rules in Azure Virtual Network Manager.'
33
description: #Required; In this article, you will deploy Security admin rules to block high-risk security ports with Azure Virtual Network Manager.
44
author: mbender-ms
55
ms.author: mbender
@@ -14,10 +14,10 @@ Remove all the comments in this template before you sign-off or merge to the
1414
main branch.
1515
-->
1616

17-
# How to block high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
17+
# Protect high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
1818

1919

20-
In this article, you'll learn to block high risk network ports using Azure Virtual Network Manager and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with network groups, and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
20+
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
2121

2222
### Describe Scenario
2323

@@ -46,7 +46,7 @@ For this How-to, you'll need a virtual network environment that includes product
4646
* Place all virtual networks in the subscription, region, and resource group
4747

4848

49-
Not sure how to build a virtual network? Learn more in [Quickstart: Create a virtual network using the Azure portal](quick-create-portal.md).
49+
Not sure how to build a virtual network? Learn more in [Quickstart: Create a virtual network using the Azure portal](/azure/virtual-network/quick-create-portal).
5050

5151
## Create a Virtual Network Manager
5252
In this section, you'll deploy a Virtual Network Manager instance with the Security admin feature in your organization.
@@ -186,9 +186,9 @@ We’re at the final step, which is to redeploy OurSecurityConfig since we’ve
186186

187187
## Next steps
188188
<!-- Add a context sentence for the following links -->
189-
- [Write how-to guides](contribute-how-to-write-howto.md)
190-
- [Links](links-how-to.md)
189+
- Learn how to [create a mesh network topology with Azure Virtual Network Manager using the Azure portal](how-to-create-mesh-network.md)
191190

191+
- Checkout the [Azure Virtual Network Manager FAQ](faq.md)
192192
<!--
193193
Remove all the comments in this template before you sign-off or merge to the
194194
main branch.

0 commit comments

Comments
 (0)