Skip to content

Commit bdf6e39

Browse files
committed
small updates for PEs
1 parent e1d3183 commit bdf6e39

File tree

2 files changed

+8
-0
lines changed

2 files changed

+8
-0
lines changed

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,10 @@ Here are some scenarios where security admin rules can be used:
3535
| **Enforcing application-level security** | Security admin rules can be used to enforce application-level security by blocking traffic to or from specific applications or services. |
3636

3737
With Azure Virtual Network Manager, you have a centralized location to manage security admin rules. Centralization allows you to define security policies at scale and apply them to multiple virtual networks at once.
38+
39+
> [!NOTE]
40+
> Currently, security admin rules do not apply to private endpoints that fall under the scope of a managed virtual network. This is a known limitation that may be addressed in a future release.
41+
3842
## How do security admin rules work?
3943

4044
Security admin rules allow or deny traffic on specific ports, protocols, and source/destination IP prefixes in a specified direction. When you define a security admin rule, you specify the following conditions:
@@ -45,6 +49,7 @@ Security admin rules allow or deny traffic on specific ports, protocols, and sou
4549
- The protocol to be used
4650

4751
To enforce security policies across multiple virtual networks, you [create and deploy a security admin configuration](how-to-block-network-traffic-portal.md). This configuration contains a set of rule collections, and each rule collection contains one or more security admin rules. Once created, you associate the rule collection with the network groups requiring security admin rules. The rules are then applied to all virtual networks contained in the network groups when the configuration is deployed. A single configuration provides a centralized and scalable enforcement of security policies across multiple virtual networks.
52+
4853
### Evaluation of security admin rules and network security groups (NSGs)
4954

5055
Security admin rules and network security groups (NSGs) can be used to enforce network security policies in Azure. However, they have different scopes and priorities.

articles/virtual-network-manager/faq.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@ Yes,
104104

105105
In Azure, VNet peering and connected groups are two methods of establishing connectivity between virtual networks (VNets). While VNet peering works by creating a 1:1 mapping between each peered VNet, connected groups use a new construct that establishes connectivity without such a mapping. In a connected group, all virtual networks are connected without individual peering relationships. For example, if VNetA, VNetB, and VNetC are part of the same connected group, connectivity is enabled between each VNet without the need for individual peering relationships.
106106

107+
### Do security admin rules apply to Azure Private Endpoints?
108+
109+
Currently, security admin rules don't apply to Azure Private Endpoints that fall under the scope of a virtual network managed by Azure Virtual Network Manager.
107110
### How can I explicitly allow Azure SQL Managed Instance traffic before having deny rules?
108111

109112
Azure SQL Managed Instance has some network requirements. If your security admin rules can block the network requirements, you can use the below sample rules to allow SQLMI traffic with higher priority than the deny rules that can block the traffic of SQL Managed Instance.

0 commit comments

Comments
 (0)