Skip to content

Commit b71d6db

Browse files
Merge pull request #248345 from mbender-ms/avnm-faq-update
virtual network manager - update FAQ for PEs
2 parents 3d94e41 + 45ed76f commit b71d6db

File tree

2 files changed

+8
-0
lines changed

2 files changed

+8
-0
lines changed

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,10 @@ Here are some scenarios where security admin rules can be used:
3535
| **Enforcing application-level security** | Security admin rules can be used to enforce application-level security by blocking traffic to or from specific applications or services. |
3636

3737
With Azure Virtual Network Manager, you have a centralized location to manage security admin rules. Centralization allows you to define security policies at scale and apply them to multiple virtual networks at once.
38+
39+
> [!NOTE]
40+
> Currently, security admin rules do not apply to private endpoints that fall under the scope of a managed virtual network.
41+
3842
## How do security admin rules work?
3943

4044
Security admin rules allow or deny traffic on specific ports, protocols, and source/destination IP prefixes in a specified direction. When you define a security admin rule, you specify the following conditions:
@@ -45,6 +49,7 @@ Security admin rules allow or deny traffic on specific ports, protocols, and sou
4549
- The protocol to be used
4650

4751
To enforce security policies across multiple virtual networks, you [create and deploy a security admin configuration](how-to-block-network-traffic-portal.md). This configuration contains a set of rule collections, and each rule collection contains one or more security admin rules. Once created, you associate the rule collection with the network groups requiring security admin rules. The rules are then applied to all virtual networks contained in the network groups when the configuration is deployed. A single configuration provides a centralized and scalable enforcement of security policies across multiple virtual networks.
52+
4853
### Evaluation of security admin rules and network security groups (NSGs)
4954

5055
Security admin rules and network security groups (NSGs) can be used to enforce network security policies in Azure. However, they have different scopes and priorities.

articles/virtual-network-manager/faq.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@ Yes,
104104

105105
In Azure, VNet peering and connected groups are two methods of establishing connectivity between virtual networks (VNets). While VNet peering works by creating a 1:1 mapping between each peered VNet, connected groups use a new construct that establishes connectivity without such a mapping. In a connected group, all virtual networks are connected without individual peering relationships. For example, if VNetA, VNetB, and VNetC are part of the same connected group, connectivity is enabled between each VNet without the need for individual peering relationships.
106106

107+
### Do security admin rules apply to Azure Private Endpoints?
108+
109+
Currently, security admin rules don't apply to Azure Private Endpoints that fall under the scope of a virtual network managed by Azure Virtual Network Manager.
107110
### How can I explicitly allow Azure SQL Managed Instance traffic before having deny rules?
108111

109112
Azure SQL Managed Instance has some network requirements. If your security admin rules can block the network requirements, you can use the below sample rules to allow SQLMI traffic with higher priority than the deny rules that can block the traffic of SQL Managed Instance.

0 commit comments

Comments
 (0)