You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/1-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
This module provides an overview of some of the technical considerations and available capabilities to design solutions for network security as a Microsoft cybersecurity architect.
2
2
3
-
Imagine you're a cybersecurity architect for a multinational corporation. Your company decided to migrate its infrastructure to Azure. You're tasked with ensuring the security and efficiency of the network architecture. Securing network infrastructure involves understanding and implementing Azure's segmentation features, setting up network security groups, utilizing Microsoft Defender for Domain Name Services (DNS), analyzing network traffic, and managing internet and private access. The challenge lies in choosing the right tools and strategies to ensure optimal network performance and security.
3
+
Imagine you're a cybersecurity architect for a multinational corporation. Your company decided to migrate its infrastructure to Azure. You're tasked with ensuring the security and efficiency of the network architecture. Securing network infrastructure involves understanding and implementing Azure's segmentation features, setting up network security groups, utilizing the network map functionality in Microsoft Defender for Cloud, analyzing network traffic, and managing internet and private access. The challenge lies in choosing the right tools and strategies to ensure optimal network performance and security.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/9-summary.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
In this module, you have learned about the various features Azure offers for network security segmentation, including Subscriptions, Virtual Networks (VNets), Network Security Groups (NSGs), Application Security Groups (ASGs), and Azure Firewall. You've also explored the three common patterns for segmenting a workload in Azure: Single VNet, Multiple VNets with peering, and Multiple VNets in a hub and spoke model. Additionally, you've delved into the functionalities of Azure network security groups and Microsoft Defender for DNS, both crucial for maintaining network security.
1
+
In this module, you have learned about the various features Azure offers for network security segmentation, including Subscriptions, Virtual Networks (VNets), Network Security Groups (NSGs), Application Security Groups (ASGs), and Azure Firewall. You've also explored the three common patterns for segmenting a workload in Azure: Single VNet, Multiple VNets with peering, and Multiple VNets in a hub and spoke model. Additionally, you've delved into the functionalities of Azure network security groups and network map both crucial for maintaining network security.
2
2
3
-
The main takeaways from this module include understanding how to use Azure's segmentation features to secure your network and resources. You've learned how to choose the appropriate segmentation pattern based on your operational needs. You've also gained knowledge on how to use Azure network security groups to filter network traffic and how Microsoft Defender for DNS adds an extra layer of protection to your resources. Furthermore, you've learnt about the importance of capturing and analyzing network traffic in real-time using Azure VPN Gateway and Azure Network Watcher. Lastly, you've understood how Microsoft Entra Internet Access and Microsoft Entra Private Access can enhance your organization's internet security and manage access to private apps and resources respectively.
3
+
The main takeaways from this module include understanding how to use Azure's segmentation features to secure your network and resources. You've learned how to choose the appropriate segmentation pattern based on your operational needs. You've also gained knowledge on how to use Azure network security groups to filter network traffic and how network map in Defender for Cloud helps protect your network resources. Furthermore, you've learnt about the importance of capturing and analyzing network traffic in real-time using Azure VPN Gateway and Azure Network Watcher. Lastly, you've understood how Microsoft Entra Internet Access and Microsoft Entra Private Access can enhance your organization's internet security and manage access to private apps and resources respectively.
4
4
5
5
## Learning objectives
6
6
@@ -10,13 +10,15 @@ You learned how to:
10
10
- Design solutions for filtering traffic with network security groups
11
11
- Design solutions for network posture measurement
12
12
- Design solutions for network monitoring
13
-
- Evaluate solutions that use Entra Internet Access and Entra Private Access
13
+
- Evaluate solutions that use Microsoft Entra Internet Access and Microsoft Entra Private Access
14
14
15
15
## Learn more with security documentation
16
16
17
17
-[Implement network segmentation patterns - Microsoft Azure Well-Architected Framework | Microsoft Learn](/azure/architecture/framework/security/design-network-segmentation)
18
18
-[Azure network security groups overview | Microsoft Learn](/azure/virtual-network/network-security-groups-overview)
19
-
-[Microsoft Defender for DNS - the benefits and features | Microsoft Learn](/azure/defender-for-cloud/defender-for-dns-introduction)
0 commit comments