You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/concept-security-admins.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,10 +59,10 @@ Based on the industry study and suggestions from Microsoft, below is what we rec
59
59
Security admin rules are similar to NSG rules in structure and the parameters they intake, but as we’ve explored so far, they’re not the exact same construct. The first difference is intended audience – admin rules are intended to be used by network admins of a central governance team, thereby delegating NSG rules to individual application or service teams to further specify security as needed. With these intentions, admin rules were designed to have a higher priority than NSGs and therefore be evaluated before NSG rules. Admin rules also include an additional action type of “Always Allow”, which allows the specified traffic through to its intended destination and terminates further (and possibly conflicting) evaluation by NSGs rules. Admin rules are also applied not only to a network group’s existing VNets but also to newly provisioned resources, as described in the previous section. Admin rules are currently applied at the VNet level, whereas NSGs can be associated at the subnet and NIC level.
60
60
Let’s boil down these differences and similarities:
61
61
62
-
| Target Audience | Applied On | Evaluation Order | Action Types | Parameters |
62
+
|Rule Type |Target Audience | Applied On | Evaluation Order | Action Types | Parameters |
ms.custom: template-concept #Required; leave this attribute/value as-is.
10
10
---
11
+
# Virtual network enforcement with Security Admin Rules?
11
12
12
-
<!-- reference of WHY doc: https://docs.microsoft.com/en-us/azure/applied-ai-services/why-applied-ai-services -->
13
+
In this article, you'll learn how Security Admins Rules provide flexible and scalable enforcement of security policies over tools like network security groups. First, you learn the different models of virtual network enforcement. Then, you'll learn the general steps for enforcing security with security admin rules.
13
14
14
-
<!-- reference of WHAT doc: https://docs.microsoft.com/en-us/azure/applied-ai-services/what-are-applied-ai-services -->
15
-
16
-
# Why Security Admin Rules?
17
-
18
-
[add your introductory paragraph]
19
-
20
-
### Virtual network enforcement
15
+
### Virtual network enforcement models
21
16
22
17
With NSGs alone, widespread enforcement on VNets across several applications, teams, or even entire organizations can be tricky. Often there’s a balancing act between attempts at centralized enforcement across an organization and handing over granular, flexible control to teams. Let’s look at a few common models of security management without security admin rules, and their pros and cons:
23
18
@@ -57,10 +52,6 @@ After the deployment of the security admin configuration, all VNets in the compa
57
52
58
53
## When to use Security Admin Rules
59
54
60
-
<!-- 4. Next steps
61
-
Required. Provide at least one next step and no more than three. Include some
62
-
context so the customer can determine why they would click the link.
63
-
-->
64
55
65
56
## Next steps
66
57
<!-- Add a context sentence for the following links -->
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/how-to-block-high-risk-ports.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'How to block high-risk network ports with SecurityAdmin Rules in Azure Virtual Network Manager.'
2
+
title: 'Protect high-risk network ports with SecurityAdmin Rules in Azure Virtual Network Manager.'
3
3
description: #Required; In this article, you will deploy Security admin rules to block high-risk security ports with Azure Virtual Network Manager.
4
4
author: mbender-ms
5
5
ms.author: mbender
@@ -14,10 +14,10 @@ Remove all the comments in this template before you sign-off or merge to the
14
14
main branch.
15
15
-->
16
16
17
-
# How to block high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
17
+
# Protect high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
18
18
19
19
20
-
In this article, you'll learn to block high risk network ports using Azure Virtual Network Manager and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with network groups, and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
20
+
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
21
21
22
22
### Describe Scenario
23
23
@@ -46,7 +46,7 @@ For this How-to, you'll need a virtual network environment that includes product
46
46
* Place all virtual networks in the subscription, region, and resource group
47
47
48
48
49
-
Not sure how to build a virtual network? Learn more in [Quickstart: Create a virtual network using the Azure portal](quick-create-portal.md).
49
+
Not sure how to build a virtual network? Learn more in [Quickstart: Create a virtual network using the Azure portal](/azure/virtual-network/quick-create-portal).
50
50
51
51
## Create a Virtual Network Manager
52
52
In this section, you'll deploy a Virtual Network Manager instance with the Security admin feature in your organization.
@@ -186,9 +186,9 @@ We’re at the final step, which is to redeploy OurSecurityConfig since we’ve
186
186
187
187
## Next steps
188
188
<!-- Add a context sentence for the following links -->
0 commit comments