Skip to content

Commit ba7092d

Browse files
Merge pull request #303383 from MicrosoftDocs/main
Auto Publish – main to live - 2025-07-26 17:00 UTC
2 parents d97fac3 + 5e1f400 commit ba7092d

File tree

2 files changed

+34
-31
lines changed

2 files changed

+34
-31
lines changed

articles/networking/foundations/network-foundations-overview.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Azure network foundation services overview
3-
description: Learn about Azure network foundation services.
2+
title: Azure Network Foundation Services Overview
3+
description: Learn how Azure Virtual Network, Private Link, and DNS work together to create secure, private cloud connectivity. Get started with Azure network foundation services today.
44
services: dns
55
author: asudbring
6-
ms.service: azure-dns
6+
ms.service: azure-virtual-network
77
ms.topic: overview
8-
ms.date: 06/24/2025
8+
ms.date: 07/26/2025
99
ms.author: allensu
1010
# Customer intent: As an administrator, I want to learn about Azure's foundation services.
1111
---
@@ -16,19 +16,20 @@ Azure network foundation services provide core connectivity for your resources i
1616

1717
The following diagram is an example of how these services can be used together in a basic Azure network.
1818

19-
[ ![An animated conceptual diagram of Azure network foundation services.](media/animated-diagram.gif) ](media/animated-diagram.gif#lightbox)
19+
:::image type="content" source="media/animated-diagram.gif" alt-text="Screenshot of an animated conceptual diagram showing how Azure Virtual Network, Private Link, and DNS services work together to create secure cloud connectivity." lightbox="media/animated-diagram.gif":::
2020

2121
This article provides a summary of each of these Azure foundational services, and illustrates how they work together. Links are also provided to more detailed guidance for each foundational service.
2222

2323
## Azure Virtual Network
2424

2525
[Azure Virtual Network](/azure/virtual-network) enables you to create private networks in the cloud, securely connecting Azure resources, the Internet, and on-premises networks.
2626

27-
Two virtual networks are provisioned in the following example:
27+
Two virtual networks are provisioned in the following example:
28+
2829
- The hub virtual network is used to deploy Azure services and provide access to data resources. The hub is optionally connected to an on-premises network.
2930
- The hub peers with a spoke network containing a business tier subnet with virtual machines to process user interactions, and an application subnet to handle data storage and transactions.
3031

31-
![A conceptual diagram of Azure Virtual Network.](media/azure-virtual-network.svg)
32+
:::image type="content" source="media/azure-virtual-network.svg" alt-text="Screenshot of a conceptual diagram showing Azure Virtual Network with hub and spoke topology, including business tier and application subnets.":::
3233

3334
For more information about designing virtual networks, see [Plan virtual networks](/azure/virtual-network/virtual-network-vnet-plan-design-arm). To create a virtual network, see [Use the Azure portal to create a virtual network](/azure/virtual-network/quick-create-portal).
3435

@@ -40,16 +41,17 @@ In the following figure, a **private endpoint** is provisioned in the app subnet
4041

4142
Private endpoints securely connect services within virtual networks.
4243

43-
![A conceptual diagram that includes Azure Private Link.](media/azure-private-link.svg)
44+
:::image type="content" source="media/azure-private-link.svg" alt-text="Screenshot of a conceptual diagram that includes Azure Private Link with private endpoint connectivity in a virtual network architecture.":::
4445

4546
> [!NOTE]
46-
> When you create a private endpoint, you're given the choice of integrating with a private DNS zone. This configuration can be added, deleted, or modified later. In the example shown here, the option to integrate with a private DNS zone is selected. This basic DNS configuration is suitable for virtual network workloads that don't use an Azure DNS Private Resolver. For more information, see [Azure Private Endpoint DNS integration](/azure/private-link/private-endpoint-dns-integration).
47+
> Private endpoints offer DNS integration options during creation. You can choose to integrate with a private DNS zone, and this configuration remains flexible - you can add, remove, or modify it after deployment. The example demonstrates selecting private DNS zone integration, which provides a straightforward DNS setup ideal for virtual network workloads without an Azure DNS Private Resolver. For more information, see [Azure Private Endpoint DNS integration](/azure/private-link/private-endpoint-dns-integration).
4748
4849
For an overview of private link and private endpoint, see [What is Azure Private Link service](/azure/private-link/private-link-service-overview) and [What is a private endpoint](/azure/private-link/private-endpoint-overview). To create a private endpoint, see [Create a private endpoint](/azure/private-link/create-private-endpoint-portal).
4950

5051
## Azure DNS
5152

5253
[Azure DNS](/azure/dns) provides cloud-based public and private domain name hosting and resolution. It includes three services that provide public or private DNS resolution and hosting, and one load balancing service:
54+
5355
* [Azure Public DNS](/azure/dns/public-dns-overview) provides high-availability hosting for public DNS domains.
5456
* [Azure Private DNS](/azure/dns/private-dns-overview) is a DNS naming and resolution service for virtual networks and the private services hosted inside those networks.
5557
* [Azure DNS Private Resolver](/azure/dns/dns-private-resolver-overview) is a fully managed high availability DNS service that enables you to query private DNS zones from an on-premises environment and vice versa without deploying VM based DNS servers.
@@ -61,7 +63,7 @@ In the following example, the private endpoint shown in the previous figure is a
6163

6264
This zone is also configured with a virtual network link to the hub virtual network, enabling all resources in the hub network to resolve the zone using Azure-provided DNS (168.63.129.16) and providing access to the private endpoint using its fully qualified DNS name (FQDN).
6365

64-
![A conceptual diagram that includes Azure DNS.](media/azure-dns.svg)
66+
:::image type="content" source="media/azure-dns.svg" alt-text="Screenshot of a conceptual diagram showing Azure DNS private zones and virtual network links for private endpoint resolution.":::
6567

6668
By default, private endpoints can only be resolved from within Azure. To resolve the private-linked storage account from on-premises, or to resolve on-premises resources from within Azure, you can configure a **DNS private resolver** in the hub virtual network (not shown).
6769

@@ -73,7 +75,7 @@ For more information about configuring a DNS private resolver, see [Resolve Azur
7375

7476
The Azure portal provides a centralized experience for [getting started with network foundation services](https://aka.ms/hubs/networkfoundation). Information and links are provided to help you create an isolated network, manage network services, secure access to resources, manage hybrid name resolution, and troubleshoot network issues.
7577

76-
[ ![A screen capture of the portal overview for foundation services.](media/portal-overview.png) ](media/portal-overview-expanded.png#lightbox)
78+
:::image type="content" source="media/portal-overview.png" alt-text="Screenshot of the Azure portal interface showing the network foundation services overview page with navigation options and service links.":::
7779

7880
Resource links are also provided in the left-hand service tree to help you understand, create, and view supporting components of the network foundation services.
7981

@@ -85,3 +87,4 @@ Resource links are also provided in the left-hand service tree to help you under
8587
- [Azure network monitoring and management](/azure/networking/monitoring-management/)
8688
- [Azure Networking Fundamentals](/azure/networking/fundamentals/)
8789
- [Azure networking](/azure/networking)
90+

articles/virtual-network/manage-network-security-group.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
2-
title: Create, change, or delete an Azure network security group
2+
title: Create, Change, or Delete Azure Network Security Groups
33
titlesuffix: Azure Virtual Network
4-
description: Learn how to create, change, or delete an Azure network security group (NSG).
4+
description: Learn to create, change, or delete Azure network security groups (NSGs) to control traffic flow and enhance network security with Portal, PowerShell, and CLI examples.
55
services: virtual-network
66
author: asudbring
77
ms.service: azure-virtual-network
88
ms.topic: how-to
9-
ms.date: 07/10/2025
9+
ms.date: 07/26/2025
1010
ms.author: allensu
1111
ms.custom: template-how-to, engagement-fy23, devx-track-azurepowershell, devx-track-azurecli
1212
# Customer intent: As a network administrator, I want to create, change, or delete network security groups so that I can control the flow of network traffic and enhance the security of my virtual networks.
1313
---
1414

1515
# Create, change, or delete a network security group
1616

17-
Security rules in network security groups (NSGs) filter the type of network traffic that flows in and out of virtual network subnets and network interfaces (NICs). To learn more about NSGs, see [Network security group overview](./network-security-groups-overview.md). Next, complete the [Filter network traffic tutorial](tutorial-filter-network-traffic.md) to gain hands-on experience with NSGs.
17+
Network security groups (NSGs) control network traffic flow through security rules that filter traffic in and out of virtual network subnets and network interfaces. This guide shows you how to create, change, or delete network security groups to enhance your Azure virtual network security. Learn to manage NSG rules using the Azure portal, PowerShell, and Azure CLI. To learn more about NSGs, see [Network security group overview](./network-security-groups-overview.md). Next, complete the [Filter network traffic tutorial](tutorial-filter-network-traffic.md) to gain hands-on experience with NSGs.
1818

1919
## Prerequisites
2020

@@ -94,7 +94,7 @@ az network nsg create \
9494

9595
In the search box at the top of the portal, enter **Network security group**. Select **Network security groups** in the search results to see the list of NSGs in your subscription.
9696

97-
:::image type="content" source="./media/manage-network-security-group/view-network-security-groups.png" alt-text="Screenshot that shows the Network security groups list in the Azure portal.":::
97+
:::image type="content" source="./media/manage-network-security-group/view-network-security-groups.png" alt-text="Screenshot of the Network security groups list in the Azure portal.":::
9898

9999
# [**PowerShell**](#tab/network-security-group-powershell)
100100

@@ -127,7 +127,7 @@ az network nsg list --out table
127127

128128
- In **Help**, view **Effective security rules**. For more information, see [Diagnose a virtual machine (VM) network traffic filter problem](diagnose-network-traffic-filter-problem.md).
129129

130-
:::image type="content" source="./media/manage-network-security-group/network-security-group-details-inline.png" alt-text="Screenshot that shows the Network security group page in the Azure portal." lightbox="./media/manage-network-security-group/network-security-group-details-expanded.png":::
130+
:::image type="content" source="./media/manage-network-security-group/network-security-group-details-inline.png" alt-text="Screenshot of the Network security group page in the Azure portal." lightbox="./media/manage-network-security-group/network-security-group-details-expanded.png":::
131131

132132
To learn more about the common Azure settings that are listed, see the following articles:
133133

@@ -213,11 +213,11 @@ For more information about the association and dissociation of an NSG, see [Asso
213213

214214
- To associate an NSG to the subnet, select **+ Associate**. Then select your virtual network and the subnet to which you want to associate the NSG. Select **OK**.
215215

216-
:::image type="content" source="./media/manage-network-security-group/associate-subnet-network-security-group.png" alt-text="Screenshot that shows associating a network security group to a subnet in the Azure portal.":::
216+
:::image type="content" source="./media/manage-network-security-group/associate-subnet-network-security-group.png" alt-text="Screenshot of associating a network security group to a subnet in the Azure portal.":::
217217

218218
- To dissociate an NSG from the subnet, select the three dots next to the subnet from which you want to dissociate the NSG, and then select **Dissociate**. Select **Yes**.
219219

220-
:::image type="content" source="./media/manage-network-security-group/dissociate-subnet-network-security-group.png" alt-text="Screenshot that shows dissociating an NSG from a subnet in the Azure portal.":::
220+
:::image type="content" source="./media/manage-network-security-group/dissociate-subnet-network-security-group.png" alt-text="Screenshot of dissociating an NSG from a subnet in the Azure portal.":::
221221

222222
# [**PowerShell**](#tab/network-security-group-powershell)
223223

@@ -270,7 +270,7 @@ If an NSG is associated with any subnets or network interfaces, you can't delete
270270

271271
1. Select **Delete**, and then select **Yes** in the confirmation dialog box.
272272

273-
:::image type="content" source="./media/manage-network-security-group/delete-network-security-group.png" alt-text="Screenshot that shows deleting a network security group in the Azure portal.":::
273+
:::image type="content" source="./media/manage-network-security-group/delete-network-security-group.png" alt-text="Screenshot of deleting a network security group in the Azure portal.":::
274274

275275
# [**PowerShell**](#tab/network-security-group-powershell)
276276

@@ -338,7 +338,7 @@ To learn more, see [Azure subscription and service limits, quotas, and constrain
338338
| **Name** | A unique name for the rule within the NSG | The name can be up to 80 characters. It must begin with a letter or number, and it must end with a letter, number, or underscore. The name can contain only letters, numbers, underscores, periods, or hyphens. |
339339
| **Description** | A text description | You can optionally specify a text description for the security rule. The description can't be longer than 140 characters. |
340340

341-
:::image type="content" source="./media/manage-network-security-group/add-security-rule.png" alt-text="Screenshot that shows adding a security rule to a network security group in the Azure portal.":::
341+
:::image type="content" source="./media/manage-network-security-group/add-security-rule.png" alt-text="Screenshot of adding a security rule to a network security group in the Azure portal.":::
342342

343343
# [**PowerShell**](#tab/network-security-group-powershell)
344344

@@ -425,7 +425,7 @@ An NSG can contain multiple security rules. To learn more about the list of info
425425

426426
The list contains any rules that you created and the [default security rules](./network-security-groups-overview.md#default-security-rules) of your NSG.
427427

428-
:::image type="content" source="./media/manage-network-security-group/view-security-rules.png" alt-text="Screenshot that shows inbound security rules of a network security group in the Azure portal.":::
428+
:::image type="content" source="./media/manage-network-security-group/view-security-rules.png" alt-text="Screenshot of inbound security rules of a network security group in the Azure portal.":::
429429

430430
# [**PowerShell**](#tab/network-security-group-powershell)
431431

@@ -471,7 +471,7 @@ az network nsg rule list \
471471
> [!NOTE]
472472
> This procedure applies only to a custom security rule. It doesn't work if you choose a default security rule.
473473
474-
:::image type="content" source="./media/manage-network-security-group/view-security-rule-details.png" alt-text="Screenshot that shows the details of an inbound security rule of a network security group in the Azure portal.":::
474+
:::image type="content" source="./media/manage-network-security-group/view-security-rule-details.png" alt-text="Screenshot of the details of an inbound security rule of a network security group in the Azure portal.":::
475475

476476
# [**PowerShell**](#tab/network-security-group-powershell)
477477

@@ -526,7 +526,7 @@ az network nsg rule show \
526526

527527
1. Change the rule's settings as needed, then select **Save**. For an explanation of all settings, see [Security rule settings](#security-rule-settings).
528528

529-
:::image type="content" source="./media/manage-network-security-group/change-security-rule.png" alt-text="Screenshot that shows changing the inbound security rule details of a network security group in the Azure portal.":::
529+
:::image type="content" source="./media/manage-network-security-group/change-security-rule.png" alt-text="Screenshot of changing the inbound security rule details of a network security group in the Azure portal.":::
530530

531531
> [!NOTE]
532532
> This procedure applies only to a custom security rule. You aren't allowed to change a default security rule.
@@ -593,11 +593,11 @@ az network nsg rule update \
593593

594594
1. Select **Inbound security rules** or **Outbound security rules**.
595595

596-
1. Select the rule that you want to delete. You may select more than one rule to delete at a time.
596+
1. Select the rule that you want to delete. You can select more than one rule to delete at a time.
597597

598598
1. Select **Delete**, then select **Yes**.
599599

600-
:::image type="content" source="./media/manage-network-security-group/delete-security-rule.png" alt-text="Screenshot that shows deleting an inbound security rule of a network security group in the Azure portal.":::
600+
:::image type="content" source="./media/manage-network-security-group/delete-security-rule.png" alt-text="Screenshot of deleting an inbound security rule of a network security group in the Azure portal.":::
601601

602602
> [!NOTE]
603603
> This procedure applies only to a custom security rule. You aren't allowed to delete a default security rule.
@@ -706,7 +706,7 @@ az network asg create \
706706

707707
In the search box at the top of the portal, enter **Application security group**. Then select **Application security groups** in the search results. A list of your application security groups appears in the Azure portal.
708708

709-
:::image type="content" source="./media/manage-network-security-group/view-application-security-groups.png" alt-text="Screenshot that shows existing application security groups in the Azure portal.":::
709+
:::image type="content" source="./media/manage-network-security-group/view-application-security-groups.png" alt-text="Screenshot of existing application security groups in the Azure portal.":::
710710

711711
# [**PowerShell**](#tab/network-security-group-powershell)
712712

@@ -766,12 +766,12 @@ az network asg show \
766766

767767
- Select **edit** next to **Tags** to add or remove tags. To learn more, see [Use tags to organize your Azure resources and management hierarchy](../azure-resource-manager/management/tag-resources.md).
768768

769-
:::image type="content" source="./media/manage-network-security-group/change-application-security-group.png" alt-text="Screenshot that shows changing an application security group in the Azure portal.":::
769+
:::image type="content" source="./media/manage-network-security-group/change-application-security-group.png" alt-text="Screenshot of changing an application security group in the Azure portal.":::
770770

771771
> [!NOTE]
772772
> You can't change the location of an application security group.
773773
774-
- Navigate to the **Access control (IAM)** blade to assign or remove permissions to the application security group.
774+
- Navigate to the **Access control (IAM)** section to assign or remove permissions to the application security group.
775775

776776
# [**PowerShell**](#tab/network-security-group-powershell)
777777

@@ -815,7 +815,7 @@ You can't delete an application security group if it contains any network interf
815815

816816
1. Select **Delete**, and then select **Yes** to delete the application security group.
817817

818-
:::image type="content" source="./media/manage-network-security-group/delete-application-security-group.png" alt-text="Screenshot that shows deleting an application security group in the Azure portal.":::
818+
:::image type="content" source="./media/manage-network-security-group/delete-application-security-group.png" alt-text="Screenshot of deleting an application security group in the Azure portal.":::
819819

820820
# [**PowerShell**](#tab/network-security-group-powershell)
821821

@@ -884,4 +884,4 @@ To manage NSGs, security rules, and application security groups, your account mu
884884

885885
- Add or remove [a network interface to or from an application security group](./virtual-network-network-interface.md?tabs=network-interface-portal#add-or-remove-from-application-security-groups).
886886

887-
- Create and assign [Azure Policy definitions](./policy-reference.md) for virtual networks.
887+
- Create and assign [Azure Policy definitions](./policy-reference.md) for virtual networks.

0 commit comments

Comments
 (0)