You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dns/dns-security-policy.md
+17-8Lines changed: 17 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ A security policy can only apply to VNets in the same region. You can create any
46
46
47
47
## DNS traffic rules
48
48
49
-
DNS traffic rules determine the action that is taken for a DNS query. Rules can be enabled or disabled.
49
+
DNS traffic rules determine the action that is taken for a DNS query.
50
50
51
51
To display DNS traffic rules in the Azure portal, select a DNS security policy and then under **Settings**, select **DNS Traffic Rules**. See the following example:
52
52
@@ -59,29 +59,38 @@ To display DNS traffic rules in the Azure portal, select a DNS security policy a
59
59
- During preview, up to 10 traffic rules are allowed per security policy. This limit will be increased to 100 for general availability.
60
60
- Multiple **DNS Domain Lists** are allowed per rule. You must have at least one DNS domain list.
61
61
- Each rule is associated with one of three **Traffic Actions**: **Allow**, **Block**, or **Alert**.
62
-
* Allow: Permit the query to the associated domain lists and log the query.
63
-
* Block: Block the query to the associated domain lists and log the block action.
64
-
* Alert: Permit the query to the associated domain lists and log an alert.
62
+
***Allow**: Permit the query to the associated domain lists and log the query.
63
+
***Block**: Block the query to the associated domain lists and log the block action.
64
+
***Alert**: Permit the query to the associated domain lists and log an alert.
65
65
- Rules can be individually **Enabled** or **Disabled**.
66
66
67
67
## Virtual network links
68
68
69
-
DNS security policies only apply to VNets that are linked to the security policy. You can link a single security policy to multiple VNets, however a single VNet can only be linked to one DNS security policy. See the following example.
69
+
DNS security policies only apply to VNets that are linked to the security policy. You can link a single security policy to multiple VNets, however a single VNet can only be linked to one DNS security policy.
70
+
71
+
The following example shows a DNS security policy linked to two VNets (**myeastvnet-40**, **myeastvnet-50**):
70
72
71
73
[](./media/dns-security-policy/virtual-network-links.png#lightbox)
72
74
73
-
You can only link VNets that are in the same region as the security policy. When you link a VNet to a DNS security policy using a virtual network link, the DNS security policy applies to all resources inside the VNet.
75
+
- You can only link VNets that are in the same region as the security policy.
76
+
- When you link a VNet to a DNS security policy using a virtual network link, the DNS security policy applies to all resources inside the VNet.
74
77
75
78
## DNS domain lists
76
79
77
-
DNS domain lists are lists of DNS domains that you associate to traffic rules. Select **DNS Domain Lists** under **Settings** for a DNS security policy to view the current domain lists associated with the policy. See the following example:
80
+
DNS domain lists are lists of DNS domains that you associate to traffic rules. Select **DNS Domain Lists** under **Settings** for a DNS security policy to view the current domain lists associated with the policy.
81
+
82
+
The following example shows the DNS domain lists that are associated with the DNS security policy **myeast-secpol**:
78
83
79
84
[](./media/dns-security-policy/domain-list.png#lightbox)
80
85
81
-
You can associate a domain list to multiple DNS traffic rules in different security policies.
86
+
You can associate a domain list to multiple DNS traffic rules in different security policies. A security policy must contain at least one domain list.
87
+
88
+
The following is an example of a DNS domain list (**blocklist-1**) that contains two domains (**malicious.contoso.com**, **exploit.adatum.com**):
82
89
83
90

84
91
92
+
- A DNS domain list must contain at least one domain. Wildcard domains are allowed.
93
+
85
94
> [!IMPORTANT]
86
95
> Be careful when creating wildcard domain lists. For example, if you create a domain list that applies to all domains (by entering `.` as the DNS domain) and then configure a DNS traffic rule to block queries to this domain list, you can prevent required services from working.
0 commit comments