azure network security
173 TopicsNew Blog Post | Enhancements to Azure WAF for Application Gateway now in General Availability
Enhancements to Azure WAF for Application Gateway now in General Availability - Microsoft Community Hub Azure Web Application Firewall (WAF) on Azure Application Gateway provides centralized protection for your web applications against common vulnerabilities and exploits. Web applications are increasingly targeted by malicious attacks that vulnerabilities. SQL Injection (SQLi) and Cross-Site Scripting (XSS) are examples of some well-known attacks. Preventing such attacks in application code can be challenging and may require rigorous maintenance, patching, and monitoring at many layers of the application topology. A centralized web application firewall helps make security management much simpler and gives better assurance to application developers and security teams against threats or intrusions. The Azure Web Application Firewall (WAF) engine is the component that inspects traffic and determines whether a web-request represents a potential attack, then takes appropriate action depending on the configuration. Previously, when you used the Azure WAF with Application Gateway, there were certain limitations in the way you could configure and monitor your WAF deployments. We are happy to announce several enhancements to the configurations and monitoring capabilities of Azure WAF when used with Azure Application Gateway going forward.48KViews0likes0CommentsConfiguring Azure Firewall in Forced Tunneling mode
In this blog, we will provide step-by-step guidance: To deploy and configure Azure Firewall in Forced Tunneling mode To deploy an environment to test traffic to Azure Firewall in Forced Tunneling mode using the provided deployment template To test forced tunnel traffic being split through additional configurations38KViews5likes9CommentsIntrusion Detection and Prevention System (IDPS) Based on Signatures
In the world of cybersecurity, the threat of cyber attacks is ever-present. One way to protect against these threats is through the use of an Intrusion Detection and Prevention System (IDPS). But what exactly is an IDPS, and how does it work? In this blog post, we’ll explore one type of IDPS: signature-based. We’ll discuss how it works, and why it’s an essential tool in the fight against cybercrime.38KViews4likes1CommentAzure Firewall NAT Behaviors
NAT, or Network Address Translation, is a method of remapping an IP address into another by modifying network address information in the IP header of packets. When traffic passes through an Azure Firewall, the firewall can perform NAT to translate the source or destination IP addresses and ports of the packets. The specific NAT behavior will depend on the firewall’s configuration and the type of NAT being used. In this blog, we cover what behaviors to expect when traffic flows for inbound traffic, through DNAT rules, and for outbound traffic through the Network, and Application rules of the Azure Firewall.37KViews9likes15CommentsAzure Network Security Proof of Concept Part 1: Planning
In this article, we discuss the steps you should consider when performing a network security POC (Container, Apps, Network) to meet regulatory and compliance standards. This is the first part in a network POC series for your Azure Network environment31KViews6likes5CommentsBuilding a POC for TLS inspection in Azure Firewall
Encrypted traffic can pose a security risk by hiding malicious traffic and illegal user activity. TLS inspection in Azure Firewall Premium provides the capability to decrypt, process the data, encrypt the data, and send it to its destination. Check out this blogpost and learn how to build a POC for TLS inspection in Azure Firewall Premium to provide visibility and protection against attacks in encrypted traffic.30KViews5likes3Comments