Skip to content

Commit c83d575

Browse files
author
Michael Bender
committed
revised based on PM feedback
1 parent 18c7080 commit c83d575

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/security/fundamentals/overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -200,15 +200,16 @@ Azure networking supports various secure remote access scenarios. Some of these
200200
- [Connect Azure Virtual Networks to each other](../../vpn-gateway/vpn-gateway-vnet-vnet-rm-ps.md)
201201

202202
### Azure Virtual Network Manager
203-
[Azure Virtual Network Manager](../../virtual-network-manager/overview.md) provides a centralized solution for protecting your virtual networks at scale. It uses Security Admin Rules to centrally define and enforce security policies for your virtual networks across your entire organization. Security admin rules takes precedence over Network Security Group (NSGs) rules. This allows organizations to enforce core security policies while still enabling application teams to tailor NSGs according to their specific needs at the application group level. Depending on the needs of your organization, you can use **Allow**, **Deny**, or **Always Allow** rule actions to enforce security policies.
203+
204+
[Azure Virtual Network Manager](../../virtual-network-manager/overview.md) provides a centralized solution for protecting your virtual networks at scale. It uses [Security Admin Rules](../../virtual-network-manager/concept-security-admins.md) to centrally define and enforce security policies for your virtual networks across your entire organization. Security admin rules takes precedence over Network Security Group (NSG) rules. This allows organizations to enforce core security policies while still enabling application teams to tailor NSGs according to their specific needs at the application group level. Depending on the needs of your organization, you can use **Allow**, **Deny**, or **Always Allow** rule actions to enforce security policies.
204205

205206
| Rule Action | Description |
206207
|-------------|-------------|
207208
| **Allow** | Allow the traffic trusted boundary by default unless denied by NSGs created by individual teams. |
208-
| **Always allow** | Always allow monitoring agent's traffic.</br>Always allow domain controller traffic</br>Always allow management traffic.|
209+
| **Always allow** | Always allow monitoring agent's traffic.</br>Always allow domain controller traffic.</br>Always allow management traffic.|
209210
| **Deny** | Protect high-risk ports by default for all exiting and new VNets. |
210211

211-
To manage your virtual networks in Azure Virtual Network Manager, you use network groups. [Network groups](../../virtual-network-manager/concept-network-groups.md) allow you to group virtual networks together for centralized management and enforcement of security policies. Network groups are a logical grouping of virtual networks based on your needs from a topology and security perspective. You can manually create network groups or use dynamic network groups with Azure Policy.
212+
In Azure Virtual Network Manager, [Network groups](../../virtual-network-manager/concept-network-groups.md) allow you to group virtual networks together for centralized management and enforcement of security policies. Network groups are a logical grouping of virtual networks based on your needs from a topology and security perspective. You can manually create network groups or use [dynamic network groups with Azure Policy](../../virtual-network-manager/concept-azure-policy-integration.md).
212213

213214
### Azure Private Link
214215

0 commit comments

Comments
 (0)