Skip to content

Commit fc6fd9f

Browse files
authored
Merge pull request #106159 from vhorne/fw-faq
add info about New-AzFirewallThreatIntelWhitelist
2 parents 63e2bbe + 4178019 commit fc6fd9f

File tree

1 file changed

+23
-1
lines changed

1 file changed

+23
-1
lines changed

articles/firewall/firewall-faq.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 02/26/2020
8+
ms.date: 03/02/2020
99
ms.author: victorh
1010
---
1111

@@ -172,3 +172,25 @@ It takes from five to seven minutes for Azure Firewall to scale out. Contact Sup
172172
## Does Azure Firewall allow access to Active Directory by default?
173173

174174
No. Azure Firewall blocks Active Directory access by default. To allow access, configure the AzureActiveDirectory service tag. For more information, see [Azure Firewall service tags](service-tags.md).
175+
176+
## Can I exclude a FQDN or an IP address from Azure Firewall Threat Intelligence based filtering?
177+
178+
Yes, you can use Azure PowerShell to do this:
179+
180+
```azurepowershell
181+
# Add a Threat Intelligence Whitelist to an Existing Azure Firewall
182+
183+
## Create the Whitelist with both FQDN and IPAddresses
184+
185+
$fw = Get-AzFirewall -Name "Name_of_Firewall" -ResourceGroupName "Name_of_ResourceGroup"
186+
$fw.ThreatIntelWhitelist = New-AzFirewallThreatIntelWhitelist `
187+
-FQDN @(“fqdn1”, “fqdn2”, …) -IpAddress @(“ip1”, “ip2”, …)
188+
189+
## Or Update FQDNs and IpAddresses separately
190+
191+
$fw = Get-AzFirewall -Name "Name_of_Firewall" -ResourceGroupName "Name_of_ResourceGroup"
192+
$fw.ThreatIntelWhitelist.FQDNs = @(“fqdn1”, “fqdn2”, …)
193+
$fw.ThreatIntelWhitelist.IpAddress = @(“ip1”, “ip2”, …)
194+
195+
Set-AzFirewall -AzureFirewall $fw
196+
```

0 commit comments

Comments
 (0)