Skip to content

Commit c8acea9

Browse files
Merge pull request #233052 from TerryLanfear/sec-mar
update
2 parents 4a218a2 + 2b9be61 commit c8acea9

File tree

2 files changed

+14
-15
lines changed

2 files changed

+14
-15
lines changed

articles/security/fundamentals/network-overview.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@ author: TerryLanfear
77
manager: rkarlin
88

99
ms.assetid: bedf411a-0781-47b9-9742-d524cf3dbfc1
10-
ms.service: information-protection
11-
ms.subservice: aiplabels
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1212
ms.topic: article
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 01/06/2022
15+
ms.date: 03/31/2023
1616
ms.author: terrylan
1717
#Customer intent: As an IT Pro or decision maker, I am looking for information on the network security controls available in Azure.
1818

@@ -96,9 +96,9 @@ The ability to control routing behavior on your virtual networks is critical. If
9696

9797
Azure networking supports the ability to customize the routing behavior for network traffic on your virtual networks. This enables you to alter the default routing table entries in your virtual network. Control of routing behavior helps you make sure that all traffic from a certain device or group of devices enters or leaves your virtual network through a specific location.
9898

99-
For example, you might have a virtual network security appliance on your virtual network. You want to make sure that all traffic to and from your virtual network goes through that virtual security appliance. You can do this by configuring [User Defined Routes](../../virtual-network/virtual-networks-udr-overview.md) (UDRs) in Azure.
99+
For example, you might have a virtual network security appliance on your virtual network. You want to make sure that all traffic to and from your virtual network goes through that virtual security appliance. You can do this by configuring [User Defined Routes](../../virtual-network/virtual-networks-udr-overview.md#custom-routes) (UDRs) in Azure.
100100

101-
[Forced tunneling](https://www.petri.com/azure-forced-tunneling) is a mechanism you can use to ensure that your services are not allowed to initiate a connection to devices on the internet. Note that this is different from accepting incoming connections and then responding to them. Front-end web servers need to respond to requests from internet hosts, and so internet-sourced traffic is allowed inbound to these web servers and the web servers are allowed to respond.
101+
[Forced tunneling](../../vpn-gateway/vpn-gateway-about-forced-tunneling.md) is a mechanism you can use to ensure that your services are not allowed to initiate a connection to devices on the internet. Note that this is different from accepting incoming connections and then responding to them. Front-end web servers need to respond to requests from internet hosts, and so internet-sourced traffic is allowed inbound to these web servers and the web servers are allowed to respond.
102102

103103
What you don't want to allow is a front-end web server to initiate an outbound request. Such requests might represent a security risk because these connections can be used to download malware. Even if you do want these front-end servers to initiate outbound requests to the internet, you might want to force them to go through your on-premises web proxies. This enables you to take advantage of URL filtering and logging.
104104

@@ -127,7 +127,7 @@ You can access these enhanced network security features by using an Azure partne
127127

128128
## Azure Firewall
129129

130-
[Azure Firewall](../../firewall/overview.md) is a cloud-native and intelligent network firewall security service that provides threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. It provides both east-west and north-south traffic inspection.
130+
Azure Firewall is a cloud-native and intelligent network firewall security service that provides threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. It provides both east-west and north-south traffic inspection.
131131

132132
Azure Firewall is offered in two SKUs: Standard and Premium. [Azure Firewall Standard](../../firewall/features.md) provides L3-L7 filtering and threat intelligence feeds directly from Microsoft Cyber Security. [Azure Firewall Premium](../../firewall/premium-features.md) provides advanced capabilities include signature-based IDPS to allow rapid detection of attacks by looking for specific patterns.
133133

@@ -164,9 +164,9 @@ Learn more:
164164

165165
### Connect your on-premises network to a virtual network with a VPN
166166

167-
You might want to connect your entire corporate network, or portions of it, to a virtual network. This is common in hybrid IT scenarios, where organizations [extend their on-premises datacenter into Azure](https://gallery.technet.microsoft.com/Datacenter-extension-687b1d84). In many cases, organizations host parts of a service in Azure, and parts on-premises. For example,they might do so when a solution includes front-end web servers in Azure and back-end databases on-premises. These types of "cross-premises" connections also make management of Azure located resources more secure, and enable scenarios such as extending Active Directory domain controllers into Azure.
167+
You might want to connect your entire corporate network, or portions of it, to a virtual network. This is common in hybrid IT scenarios, where organizations extend their on-premises datacenter into Azure. In many cases, organizations host parts of a service in Azure, and parts on-premises. For example,they might do so when a solution includes front-end web servers in Azure and back-end databases on-premises. These types of "cross-premises" connections also make management of Azure located resources more secure, and enable scenarios such as extending Active Directory domain controllers into Azure.
168168

169-
One way to accomplish this is to use a [site-to-site VPN](https://www.techopedia.com/definition/30747/site-to-site-vpn). The difference between a site-to-site VPN and a point-to-site VPN is that the latter connects a single device to a virtual network. A site-to-site VPN connects an entire network (such as your on-premises network) to a virtual network. Site-to-site VPNs to a virtual network use the highly secure IPsec tunnel mode VPN protocol.
169+
One way to accomplish this is to use a site-to-site VPN. The difference between a site-to-site VPN and a point-to-site VPN is that the latter connects a single device to a virtual network. A site-to-site VPN connects an entire network (such as your on-premises network) to a virtual network. Site-to-site VPNs to a virtual network use the highly secure IPsec tunnel mode VPN protocol.
170170

171171
Learn more:
172172

@@ -194,7 +194,7 @@ It is possible to use many virtual networks for your deployments. There are vari
194194

195195
One option is for services on one virtual network to connect to services on another virtual network, by "looping back" through the internet. The connection starts on one virtual network, goes through the internet, and then comes back to the destination virtual network. This option exposes the connection to the security issues inherent in any internet-based communication.
196196

197-
A better option might be to create a site-to-site VPN that connects between two virtual networks. This method uses the same [IPSec tunnel mode](/previous-versions/windows/it-pro/windows-server-2003/cc786385(v=ws.10)) protocol as the cross-premises site-to-site VPN connection mentioned above.
197+
A better option might be to create a site-to-site VPN that connects between two virtual networks. This method uses the same IPSec tunnel mode protocol as the cross-premises site-to-site VPN connection mentioned above.
198198

199199
The advantage of this approach is that the VPN connection is established over the Azure network fabric, instead of connecting over the internet. This provides you an extra layer of security, compared to site-to-site VPNs that connect over the internet.
200200

@@ -244,7 +244,6 @@ You can gain the benefits of network level load balancing in Azure by using Azur
244244

245245
Learn more:
246246

247-
* [Internet-facing load balancer between multiple virtual machines or services](../../load-balancer/load-balancer-overview.md)
248247
* [Internal load balancer overview](../../load-balancer/load-balancer-overview.md)
249248

250249
### Global load balancing
@@ -292,7 +291,7 @@ Azure provides you with a highly available and high-performing external DNS solu
292291
Learn more:
293292

294293
* [Azure DNS overview](../../dns/dns-overview.md)
295-
* [Azure DNS private zones](../../dns/private-dns-overview.md) allows you to configure private DNS names for Azure resources rather than the automatically assigned names without the need to add a custom DNS solution.
294+
* [Azure DNS private zones](../../dns/private-dns-privatednszone.md) allows you to configure private DNS names for Azure resources rather than the automatically assigned names without the need to add a custom DNS solution.
296295

297296
## Perimeter network architecture
298297

@@ -302,7 +301,7 @@ You can design perimeter networks in a number of different ways. The decision to
302301

303302
Learn more:
304303

305-
* [Microsoft Cloud Services and Network Security](network-best-practices.md)
304+
* [Perimeter networks for security zones](network-best-practices.md#deploy-perimeter-networks-for-security-zones)
306305

307306
## Azure DDoS protection
308307

@@ -392,7 +391,7 @@ Logging at a network level is a key function for any network security scenario.
392391
* Event logs. These logs provide information about what NSG rules were applied.
393392
* Counter logs. These logs let you know how many times each NSG rule was applied to deny or allow traffic.
394393

395-
You can also use [Microsoft Power BI](https://powerbi.microsoft.com/what-is-power-bi/), a powerful data visualization tool, to view and analyze these logs.
394+
You can also use Microsoft Power BI, a powerful data visualization tool, to view and analyze these logs.
396395
Learn more:
397396

398397
* [Azure Monitor logs for Network Security Groups (NSGs)](../../virtual-network/virtual-network-nsg-manage-log.md)

articles/security/fundamentals/zero-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: terrylan
99
manager: rkarlin
10-
ms.date: 03/08/2022
10+
ms.date: 03/31/2023
1111
---
1212

1313
# Zero Trust security
@@ -79,4 +79,4 @@ To learn about recommendations and core concepts for deploying secure email, doc
7979

8080
## Next steps
8181

82-
- To learn how to enhance your security solutions by integrating with Microsoft products, see Integrate with [Microsoft's Zero Trust solutions](/security/zero-trust/integrate/overview)
82+
- To learn how to enhance your security solutions by integrating with Microsoft products, see [Integrate with Microsoft's Zero Trust solutions](/security/zero-trust/integrate/overview)

0 commit comments

Comments
 (0)