Skip to content

Commit e14231d

Browse files
committed
add tshoot tip
1 parent 7d79b57 commit e14231d

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/firewall/firewall-preview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 09/27/2022
8+
ms.date: 10/04/2022
99
ms.author: victorh
1010
---
1111

@@ -161,6 +161,9 @@ Policy analytics starts monitoring the flows in the DNAT, Network, and Applicati
161161
6. Go to the Firewall attached to the policy and enter the **Diagnostic settings** page. You'll see the **FirewallPolicySetting** added there as part of the policy analytics feature.
162162
7. Select **Edit Setting**, and ensure the **Resource specific** toggle is checked, and the highlighted tables are checked. In the previous example, all logs are written to the log analytics workspace.
163163

164+
> [!TIP]
165+
> Policy Analytics has a dependency on both Log Analytics and Azure Firewall resource specific logging. Verify the Firewall is configured appropriately or follow the previous instructions. Be aware that logs take 60 minutes to appear after enabling them for the first time. This is because logs are aggregated in the backend every hour. You can check logs are configured appropriately by running a log analytics query on the resource specific tables such as **AZFWNetworkRuleAggregation**, **AZFWApplicationRuleAggregation**, and **AZFWNatRuleAggregation**.
166+
164167
#### Firewall with Diagnostics settings already configured
165168

166169
1. Ensure that the Firewall attached to the policy is logging to **Resource Specific** tables, and that the following three tables are also selected:

0 commit comments

Comments
 (0)