Skip to content

Commit e934c85

Browse files
authored
Merge pull request #107235 from memildin/asc-melvyn-anh
Added the list of supported ports
2 parents 370b43a + 1c5780a commit e934c85

File tree

1 file changed

+86
-22
lines changed

1 file changed

+86
-22
lines changed

articles/security-center/security-center-adaptive-network-hardening.md

Lines changed: 86 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Adaptive Network Hardening in Azure Security Center | Microsoft Docs
3-
description: Learn how to harden, based on actual traffic patterns, your network security groups (NSG) rules and further improve your security posture.
3+
description: Learn how to use actual traffic patterns to harden your network security groups (NSG) rules and further improve your security posture.
44
services: security-center
55
documentationcenter: na
66
author: memildin
@@ -12,9 +12,10 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 05/24/2019
15+
ms.date: 03/11/2020
1616
ms.author: memildin
1717
---
18+
1819
# Adaptive Network Hardening in Azure Security Center
1920
Learn how to configure Adaptive Network Hardening in Azure Security Center.
2021

@@ -23,12 +24,14 @@ Applying [network security groups (NSG)](https://docs.microsoft.com/azure/virtua
2324

2425
Adaptive Network Hardening provides recommendations to further harden the NSG rules. It uses a machine learning algorithm that factors in actual traffic, known trusted configuration, threat intelligence, and other indicators of compromise, and then provides recommendations to allow traffic only from specific IP/port tuples.
2526

26-
For example, lets say the existing NSG rule is to allow traffic from 140.20.30.10/24 on port 22. The Adaptive Network Hardenings recommendation, based on the analysis, would be to narrow the range and allow traffic from 140.23.30.10/29 – which is a narrower IP range, and deny all other traffic to that port.
27+
For example, let's say the existing NSG rule is to allow traffic from 140.20.30.10/24 on port 22. The Adaptive Network Hardening's recommendation, based on the analysis, would be to narrow the range and allow traffic from 140.23.30.10/29 – which is a narrower IP range, and deny all other traffic to that port.
2728

28-
![network hardening view](./media/security-center-adaptive-network-hardening/traffic-hardening.png)
29+
>[!TIP]
30+
> Adaptive Network Hardening recommendations are only supported on specific ports. For the full list, see [#which-ports-are-supported](Which ports are supported?) below.
31+
32+
33+
![Network hardening view](./media/security-center-adaptive-network-hardening/traffic-hardening.png)
2934

30-
> [!NOTE]
31-
> Adaptive Network Hardening recommendations are supported on the following ports: 22, 3389, 21, 23, 445, 4333, 3306, 1433, 1434, 53, 20, 5985, 5986, 5432, 139, 66, 1128
3235

3336
## View Adaptive Network Hardening alerts and rules
3437

@@ -38,7 +41,7 @@ For example, let’s say the existing NSG rule is to allow traffic from 140.20.3
3841
* **Unscanned resources**: VMs that the Adaptive Network Hardening algorithm cannot be run on because of one of the following reasons:
3942
* **VMs are Classic VMs**: Only Azure Resource Manager VMs are supported.
4043
* **Not enough data is available**: In order to generate accurate traffic hardening recommendations, Security Center requires at least 30 days of traffic data.
41-
* **VM is not protected by ASC standard**: Only VMs that are set to Security Centers Standard pricing tier are eligible for this feature.
44+
* **VM is not protected by ASC standard**: Only VMs that are set to Security Center's Standard pricing tier are eligible for this feature.
4245

4346
![unhealthy resources](./media/security-center-adaptive-network-hardening/unhealthy-resources.png)
4447

@@ -74,19 +77,19 @@ You may want to modify the parameters of a rule that has been recommended. For e
7477

7578
Some important guidelines for modifying an Adaptive Network Hardening rule:
7679

77-
* You can modify the parameters of allow rules only.
78-
* You cannot change allow rules to become deny rules.
80+
* You can modify the parameters of "allow" rules only.
81+
* You cannot change "allow" rules to become "deny" rules.
7982

8083
> [!NOTE]
81-
> Creating and modifying deny rules is done directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
84+
> Creating and modifying "deny" rules is done directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
8285
83-
* A **Deny all traffic** rule is the only type of deny rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-rule)).
86+
* A **Deny all traffic** rule is the only type of "deny" rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-rule)).
8487
> [!NOTE]
85-
> A **Deny all traffic** rule is recommended when, as a result of running the algorithm, Security Center does not identify traffic that should be allowed, based on the existing NSG configuration. Therefore, the recommended rule is to deny all traffic to the specified port. The name of this type of rule is displayed as *System Generated*. After enforcing this rule, its actual name in the NSG will be a string comprised of the protocol, traffic direction, DENY, and a random number.
88+
> A **Deny all traffic** rule is recommended when, as a result of running the algorithm, Security Center does not identify traffic that should be allowed, based on the existing NSG configuration. Therefore, the recommended rule is to deny all traffic to the specified port. The name of this type of rule is displayed as "*System Generated*". After enforcing this rule, its actual name in the NSG will be a string comprised of the protocol, traffic direction, "DENY", and a random number.
8689
8790
*To modify an Adaptive Network Hardening rule:*
8891

89-
1. To modify some of the parameters of a rule, in the **Rules** tab, click on the three dots (...) at the end of the rules row, and click **Edit**.
92+
1. To modify some of the parameters of a rule, in the **Rules** tab, click on the three dots (...) at the end of the rule's row, and click **Edit**.
9093

9194
![edit rule](./media/security-center-adaptive-network-hardening/edit-hard-rule.png)
9295

@@ -103,10 +106,10 @@ Some important guidelines for modifying an Adaptive Network Hardening rule:
103106

104107
### Add a new rule <a name ="add-rule"> </a>
105108

106-
You can add an allow rule that was not recommended by Security Center.
109+
You can add an "allow" rule that was not recommended by Security Center.
107110

108111
> [!NOTE]
109-
> Only allow rules can be added here. If you want to add deny rules, you can do so directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
112+
> Only "allow" rules can be added here. If you want to add "deny" rules, you can do so directly on the NSG. For more information, see [Create, change, or delete a network security group](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group).
110113
111114
*To add an Adaptive Network Hardening rule:*
112115

@@ -130,15 +133,76 @@ When necessary, you can delete a recommended rule for the current session. For e
130133

131134
*To delete an Adaptive Network Hardening rule for your current session:*
132135

133-
1. In the **Rules** tab, click on the three dots (...) at the end of the rules row, and click **Delete**.
136+
1. In the **Rules** tab, click on the three dots (...) at the end of the rule's row, and click **Delete**.
134137

135138
![hardening rules](./media/security-center-adaptive-network-hardening/delete-hard-rule.png)
136139

137-
138-
139-
140-
141-
142-
143140

144141

142+
## Which ports are supported?
143+
144+
Adaptive Network Hardening recommendations are only supported on specific ports. This table gives you the full list:
145+
146+
|Port|Protocol|Associated Service|
147+
|:---:|:----:|:----|
148+
|13|UDP|Daytime service|
149+
|17|UDP|QOTD protocol|
150+
|19|UDP|CHARGEN protocol|
151+
|22|TCP|SSH|
152+
|23|TCP|Telnet|
153+
|53|UDP|DNS|
154+
|69|UDP|TFTP|
155+
|81|TCP|Potentially malicious (TOR exit node)|
156+
|111|TCP/UDP|RPC|
157+
|119|TCP|NNTP|
158+
|123|UDP|NTP|
159+
|135|TCP/UDP|Endpoint Mapper; RPC; DCE|
160+
|137|TCP/UDP|NetBIOS Name Service|
161+
|138|TCP/UDP|NetBIOS Datagram Service|
162+
|139|TCP|NetBIOS Session Service|
163+
|161|TCP/UDP|SNMP|
164+
|162|TCP/UDP|SNMP|
165+
|389|TCP|LDAP|
166+
|445|TCP|SMB|
167+
|512|TCP|Rexec|
168+
|514|TCP|Remote shell|
169+
|593|TCP/UDP|HTTP RPC|
170+
|636|TCP|LDAP|
171+
|873|TCP|Rsync|
172+
|1433|TCP|MS SQL|
173+
|1434|UDP|MS SQL|
174+
|1900|UDP|SSDP|
175+
|1900|UDP|SSDP|
176+
|2049|TCP/UDP|NFS|
177+
|2301|TCP|Compaq management service|
178+
|2323|TCP|3d-nfsd|
179+
|2381|TCP|Compaq management service|
180+
|3268|TCP|LDAP|
181+
|3306|TCP|MySQL|
182+
|3389|TCP|RDP|
183+
|4333|TCP|mSQL|
184+
|5353|UDP|mDNS|
185+
|5432|TCP|PostgreSQL|
186+
|5555|TCP|Personal Agent; HP OmniBack|
187+
|5800|TCP|VNC|
188+
|5900|TCP|Remote framebuffer; VNC|
189+
|5900|TCP|VNC|
190+
|5985|TCP|Windows PowerShell|
191+
|5986|TCP|Windows PowerShell|
192+
|6379|TCP|Redis|
193+
|6379|TCP|Redis|
194+
|7000|TCP|Cassandra|
195+
|7001|TCP|Cassandra|
196+
|7199|TCP|Cassandra|
197+
|8081|TCP|CosmosDB; Sun Proxy Admin|
198+
|8089|TCP|Splunk|
199+
|8545|TCP|Potentially malicious (Cryptominer)|
200+
|9042|TCP|Cassandra|
201+
|9160|TCP|Cassandra|
202+
|9300|TCP|Elasticsearch|
203+
|11211|UDP|Memcached|
204+
|16379|TCP|Redis|
205+
|26379|TCP|Redis|
206+
|27017|TCP|MongoDB|
207+
|37215|TCP|Potentially malicious|
208+
||||

0 commit comments

Comments
 (0)