You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-network-recommendations.md
+19-9Lines changed: 19 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,7 @@ To open the Network map:
44
44
2. Under **Network map** click **See topology**.
45
45
46
46
The default view of the topology map displays:
47
+
47
48
- Subscriptions you selected in Azure. The map supports multiple subscriptions.
48
49
- VMs, subnets, and VNets of the Resource Manager resource type (Classic Azure resources are not supported)
49
50
- Peered VNets
@@ -60,6 +61,7 @@ The Network map can show you your Azure resources in a **Topology** view and a *
60
61
### The topology view
61
62
62
63
In the **Topology** view of the networking map, you can view the following insights about your networking resources:
64
+
63
65
- In the inner circle, you can see all the Vnets within your selected subscriptions, the next circle is all the subnets, the outer circle is all the virtual machines.
64
66
- The lines connecting the resources in the map let you know which resources are associated with each other, and how your Azure network is structured.
65
67
- Use the severity indicators to quickly get an overview of which resources have open recommendations from Security Center.
@@ -69,13 +71,15 @@ In the **Topology** view of the networking map, you can view the following insig
69
71
Because the map is interactive and dynamic, every node is clickable, and the view can change based on the filters:
70
72
71
73
1. You can modify what you see on the network map by using the filters at the top. You can focus the map based on:
74
+
72
75
-**Security health**: You can filter the map based on Severity (High, Medium, Low) of your Azure resources.
73
76
-**Recommendations**: You can select which resources are displayed based on which recommendations are active on those resources. For example, you can view only resources for which Security Center recommends you enable Network Security Groups.
74
77
-**Network zones**: By default, the map displays only Internet facing resources, you can select internal VMs as well.
75
78
76
79
2. You can click **Reset** in top left corner at any time to return the map to its default state.
77
80
78
81
To drill down into a resource:
82
+
79
83
1. When you select a specific resource on the map, the right pane opens and gives you general information about the resource, connected security solutions if there are any, and the recommendations relevant to the resource. It's the same type of behavior for each type of resource you select.
80
84
2. When you hover over a node in the map, you can view general information about the resource, including subscription, resource type, and resource group.
81
85
3. Use the link to zoom into the tool tip and refocus the map on that specific node.
@@ -94,6 +98,7 @@ For example, you might detect two machines that you weren’t aware could commun
94
98
### Investigate resources
95
99
96
100
To drill down into a resource:
101
+
97
102
1. When you select a specific resource on the map, the right pane opens and gives you general information about the resource, connected security solutions if there are any, and the recommendations relevant to the resource. It's the same type of behavior for each type of resource you select.
98
103
2. Click **Traffic** to see the list of possible outbound and inbound traffic on the resource - this is a comprehensive list of who can communicate with the resource and who it can communicate with, and through which protocols and ports. For example, when you select a VM, all the VMs it can communicate with are shown, and when you select a subnet, all the subnets which it can communicate with are shown.
99
104
@@ -125,15 +130,20 @@ The third level displays virtual machines, which is similar to what is described
|Machine|40|Network Security Groups for virtual machines should be enabled|Enable Network Security Groups to control network access of your virtual machines.|
131
-
|Subnet|35|Network Security Groups on the subnet level should be enabled|Enable network security groups to control network access of resources deployed in your subnets.|
132
-
|Machine|30|Just-In-Time network access control should be applied on virtual machines|Apply just in time VM access control to permanently lock down access to selected ports, and enable authorized users to open them via the same mechanism and for a limited amount of time.|
133
-
|Machine|20|Restrict access through Internet facing endpoint|Harden the network security groups of your Internet facing VMs by restricting the access of your existing allow rules.|
134
-
|Machine|10|Add a next generation firewall|Add a Next Generation Firewall (NGFW) solution to better protect your internet facing VMs.|
135
-
|Machine|5|Route traffic through network gateway firewall only|In order to complete the deployment of your next generation firewall solution, traffic to your protected internet facing VMs should be routed only via the next generation firewall solution.|
136
-
|VNet|5|Enable DDoS protection standard|Applications with public IPs in these virtual networks are not protected with the DDOS protection service standard. It is advised to enable it to enable mitigation of network volumetric and protocol attacks.|
|Network security groups on the subnet level should be enabled|Enable network security groups to control network access of resources deployed in your subnets.|High/ Medium|30|Subnet|
136
+
|Virtual machines should be associated with a network security group|Enable Network Security Groups to control network access of your virtual machines.|High/ Medium|30|Virtual machine|
137
+
|Access should be restricted for permissive network security groups with Internet-facing VMs|Harden the network security groups of your Internet-facing VMs by restricting the access of your existing allow rules.|High|20|Virtual machine|
138
+
|The rules for web applications on IaaS NSGs should be hardened|Harden the network security group (NSG) of your virtual machines that are running web applications, with NSG rules that are overly permissive with regards to web application ports.|High|20|Virtual machine|
139
+
|Access to App Services should be restricted|Restrict access to your App Services by changing the networking configuration, to deny inbound traffic from ranges that are too broad.|High|10|App service|
140
+
|Management ports should be closed on your virtual machines|Harden the network security group of your virtual machines to restrict access to management ports.|High|10|Virtual machine|
141
+
DDoS Protection Standard should be enabled|Protect virtual networks containing applications with public IPs by enabling DDoS protection service standard. DDoS protection enables mitigation of network volumetric and protocol attacks.|High|10|Virtual network|
142
+
|IP forwarding on your virtual machine should be disabled|Disable IP forwarding. When IP forwarding is enabled on a virtual machine's NIC, the machine can receive traffic addressed to other destinations. IP forwarding is rarely required (e.g., when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team.|Medium|10|Virtual machine|
143
+
|Web Application should only be accessible over HTTPS|Enable "HTTPS only" access for web applications. Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.|Medium|20|Web application|
144
+
|Just-in-time network access control should be applied on virtual machines|Apply just-in-time (JIT ) virtual machine (VM) access control to permanently lock down access to selected ports, and enable authorized users to open them, via JIT, for a limited amount of time only.|High|20|Virtual machine|
145
+
|Function Apps should only be accessible over HTTPS|Enable "HTTPS only" access for function apps. Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.|Medium|20|Function app|
146
+
|Secure transfer to storage accounts should be enabled|Enable secure transfer to storage accounts. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks, such as man-in-the-middle, eavesdropping, and session-hijacking.|High|20|Storage account|
137
147
138
148
## See also
139
149
To learn more about recommendations that apply to other Azure resource types, see the following:
0 commit comments