Network - oWretch/policy GitHub Wiki
Category | Policy | Platform | Landing Zones | Production | Decommissioned | Management | Corp | Connectivity | Sandbox | Identity |
---|---|---|---|---|---|---|---|---|---|---|
Network |
[Deprecated]: Azure firewall policy should enable TLS inspection within application rules This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
[Deprecated]: Azure Firewall Premium should configure a valid intermediate certificate to enable TLS inspection This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
[Deprecated]: Bypass list of Intrusion Detection and Prevention System (IDPS) should be empty in Firewall Policy Premium This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
[Deprecated]: Firewall Policy Premium should enable all IDPS signature rules to monitor all inbound and outbound traffic flows This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
[Deprecated]: Firewall Policy Premium should enable the Intrusion Detection and Prevention System (IDPS) This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
[Deprecated]: Web Application Firewall (WAF) should enable all firewall rules for Application Gateway This policy is deprecated because sometimes it is impractical to enable all WAF rules. Instead of continuing to use this policy, we recommend you instead assign this replacement policy with policy ID 564feb30-bf6a-4854-b4bb-0d2d2d1e6c66. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
[Preview]: All Internet traffic should be routed via your deployed Azure Firewall Azure Security Center has identified that some of your subnets aren't protected with a next generation firewall. Protect your subnets from potential threats by restricting access to them with Azure Firewall or a supported next generation firewall |
AuditIfNotExists Disabled |
||||||||
Network |
Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2 This policy enables you to restrict that Application Gateways is always deployed with predefined Microsoft policy that is using TLS version 1.2 |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
Azure Web Application Firewall should be enabled for Azure Front Door entry-points Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. |
Deny Disabled Audit |
Deny Disabled Audit |
Audit Deny Disabled |
||||||
Network |
Deny or Audit service endpoints on subnets This Policy will deny/audit Service Endpoints on subnets. Service Endpoints allows the network traffic to bypass Network appliances, such as the Azure Firewall. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
Deny vNet peering cross subscription. This policy denies the creation of vNet Peerings outside of the same subscriptions under the assigned scope. |
Deny Disabled Audit |
||||||||
Network |
Deploy Activity Log Azure FireWall Delete Alert Policy to Deploy Activity Log Azure Firewall Delete Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy Activity Log NSG Delete Alert Policy to Deploy Activity Log NSG Delete Alert |
deployIfNotExists disabled |
deployIfNotExists disabled |
|||||||
Network |
Deploy Activity Log Route Table Update Alert Policy to Deploy Activity Log Route Table Update Alert |
deployIfNotExists disabled |
deployIfNotExists disabled |
|||||||
Network |
Deploy Activity Log VPN Gateway Delete Alert Policy to Deploy Activity Log VPN Gateway Delete Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy AFW FirewallHealth Alert Policy to audit/deploy Azure Firewall FirewallHealth Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy AFW SNATPortUtilization Alert Policy to audit/deploy Azure Firewall SNATPortUtilization Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy ERG ExpressRoute Bits In Alert Policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy ERG ExpressRoute Bits Out Alert Policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy ERG ExpressRoute CPU Utilization Alert Policy to audit/deploy ER Gateway Express Route CPU Utilization Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy ExpressRoute Circuits Arp Availability Alert Policy to audit/deploy ExpressRoute Circuits Arp Availability Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy ExpressRoute Circuits Bgp Availability Alert Policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert Policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert Policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy PDNSZ Capacity Utilization Alert Policy to audit/deploy Private DNS Zone Capacity Utilization Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy PDNSZ Query Volume Alert Policy to audit/deploy Private DNS Zone Query Volume Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy PDNSZ Record Set Capacity Alert Policy to audit/deploy Private DNS Zone Record Set Capacity Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy PDNSZ Registration Capacity Utilization Alert Policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy PIP Bytes in DDoS Attack Alert Policy to audit/deploy PIP Bytes in DDoS Attack Alert |
disabled deployIfNotExists |
disabled deployIfNotExists |
|||||||
Network |
Deploy PIP DDoS Attack Alert Policy to audit/deploy PIP DDoS Attack Alert |
deployIfNotExists disabled |
deployIfNotExists disabled |
|||||||
Network |
Deploy PIP Packets in DDoS Attack Alert Policy to audit/deploy PIP Packets in DDoS Attack Alert |
disabled deployIfNotExists |
disabled deployIfNotExists |
|||||||
Network |
Deploy PIP VIP Availability Alert Policy to audit/deploy PIP VIP Availability Alert |
deployIfNotExists disabled |
deployIfNotExists disabled |
|||||||
Network |
Deploy VNet DDoS Attack Alert Policy to audit/deploy Virtual Network DDoS Attack Alert |
deployIfNotExists disabled |
deployIfNotExists disabled |
|||||||
Network |
Deploy VNetG Egress Packet Drop Count Alert Policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG Egress Packet Drop Mismatch Alert Policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG ExpressRoute Bits Per Second Alert Policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG ExpressRoute CPU Utilization Alert Policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG Ingress Packet Drop Count Alert Policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG Ingress Packet Drop Mismatch Alert Policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG Tunnel Bandwidth Alert Policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VNetG Tunnel Egress Alert Policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy VNetG Tunnel Ingress Alert Policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy VPNG BGP Peer Status Alert Policy to audit/deploy VPN Gateway BGP Peer Status Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VPNG Bandwidth Utilization Alert Policy to audit/deploy VPN Gateway Bandwidth Utilization Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VPNG Egress Alert Policy to audit/deploy VPN Gateway Egress Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy VPNG Egress Packet Drop Count Alert Policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VPNG Egress Packet Drop Mismatch Alert Policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VPNG Ingress Alert Policy to audit/deploy VPN Gateway Ingress Alert |
disabled deployIfNotExists |
||||||||
Network |
Deploy VPNG Ingress Packet Drop Count Alert Policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert |
deployIfNotExists disabled |
||||||||
Network |
Deploy VPNG Ingress Packet Drop Mismatch Alert Policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert |
deployIfNotExists disabled |
||||||||
Network |
Enforce specific configuration of Network Security Groups (NSG) This policy enforces the configuration of Network Security Groups (NSG). |
Disabled Modify |
Disabled Modify |
|||||||
Network |
Enforce specific configuration of User-Defined Routes (UDR) This policy enforces the configuration of User-Defined Routes (UDR) within a subnet. |
Disabled Modify |
Disabled Modify |
|||||||
Network |
Gateway subnets should not be configured with a network security group This policy denies if a gateway subnet is configured with a network security group. Assigning a network security group to a gateway subnet will cause the gateway to stop functioning. |
deny | deny | |||||||
Network |
Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. |
deny | deny | |||||||
Network |
Network interfaces should not have public IPs This policy denies the network interfaces which are configured with any public IP. Public IP addresses allow internet resources to communicate inbound to Azure resources, and Azure resources to communicate outbound to the internet. This should be reviewed by the network security team. |
deny | deny | |||||||
Network |
Network Watcher should be enabled Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Scenario level monitoring enables you to diagnose problems at an end to end network level view. It is required to have a network watcher resource group to be created in every region where a virtual network is present. An alert is enabled if a network watcher resource group is not available in a particular region. |
AuditIfNotExists Disabled |
||||||||
Network |
Subnets should have a Network Security Group This policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
Subnets should have a User Defined Route This policy denies the creation of a subnet without a User Defined Route (UDR). |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
Virtual networks should be protected by Azure DDoS Protection Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs. |
Modify Disabled Audit |
Modify Disabled Audit |
|||||||
Network |
VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users Disabling local authentication methods improves security by ensuring that VPN Gateways use only Azure Active Directory identities for authentication. Learn more about Azure AD authentication at https://docs.microsoft.com/azure/vpn-gateway/openvpn-azure-ad-tenant |
Deny Disabled Audit |
Deny Disabled Audit |
Audit Deny Disabled |
||||||
Network |
Web Application Firewall (WAF) should be enabled for Application Gateway Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. |
Deny Disabled Audit |
Deny Disabled Audit |
Audit Deny Disabled |
||||||
Network |
Web Application Firewall (WAF) should use the specified mode for Application Gateway Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Application Gateway. |
Deny Disabled Audit |
Deny Disabled Audit |
|||||||
Network |
Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Azure Front Door Service. |
Deny Disabled Audit |
Deny Disabled Audit |
Category | Policy | Platform | Landing Zones | Production | Decommissioned | Management | Corp | Connectivity | Sandbox | Identity |
---|---|---|---|---|---|---|---|---|---|---|
Network |
Deploy Activity Log Azure FireWall Delete Alert Policy to Deploy Activity Log Azure Firewall Delete Alert |
ALZMonitorResourceGroupLocation = eastus activityFWDeleteAlertState = true ALZMonitorResourceGroupName = rg-amba-monitoring-001 ALZMonitorResourceGroupTags = {"Project":"amba-monitoring"}
|
||||||||
Network |
Deploy Activity Log NSG Delete Alert Policy to Deploy Activity Log NSG Delete Alert |
activityNSGDeleteAlertState = true
|
activityNSGDeleteAlertState = true
|
|||||||
Network |
Deploy Activity Log Route Table Update Alert Policy to Deploy Activity Log Route Table Update Alert |
activityUDRUpdateAlertState = true
|
activityUDRUpdateAlertState = true
|
|||||||
Network |
Deploy Activity Log VPN Gateway Delete Alert Policy to Deploy Activity Log VPN Gateway Delete Alert |
activityVPNGWDeleteAlertState = true
|
||||||||
Network |
Deploy AFW FirewallHealth Alert Policy to audit/deploy Azure Firewall FirewallHealth Alert |
FirewallHealthWindowSize = PT5M FirewallHealthThreshold = 90 FirewallHealthAlertSeverity = 0 FirewallHealthAlertState = true FirewallHealthEvaluationFrequency = PT1M
|
||||||||
Network |
Deploy AFW SNATPortUtilization Alert Policy to audit/deploy Azure Firewall SNATPortUtilization Alert |
AFWSNATPortUtilizationWindowSize = PT5M AFWSNATPortUtilizationFrequency = PT1M AFWSNATPortUtilizationAlertState = true AFWSNATPortUtilizationThreshold = 80 AFWSNATPortUtilizationAlertSeverity = 1
|
||||||||
Network |
Deploy ERG ExpressRoute Bits In Alert Policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert |
ERGwExpressRouteBitsInAlertState = true ERGwExpressRouteBitsInEvaluationFrequency = PT5M ERGwExpressRouteBitsInThreshold = 1 ERGwExpressRouteBitsInWindowSize = PT5M ERGwExpressRouteBitsInAlertSeverity = 0
|
||||||||
Network |
Deploy ERG ExpressRoute Bits Out Alert Policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert |
ERGwExpressRouteBitsOutThreshold = 1 ERGwExpressRouteBitsOutAlertState = true ERGwExpressRouteBitsOutWindowSize = PT5M ERGwExpressRouteBitsOutAlertSeverity = 0 ERGwExpressRouteBitsOutEvaluationFrequency = PT5M
|
||||||||
Network |
Deploy ERG ExpressRoute CPU Utilization Alert Policy to audit/deploy ER Gateway Express Route CPU Utilization Alert |
ERGwExpressRouteCpuUtilWindowSize = PT5M ERGwExpressRouteCpuUtilEvaluationFrequency = PT1M ERGwExpressRouteCpuUtilAlertSeverity = 1 ERGwExpressRouteCpuUtilThreshold = 80 ERGwExpressRouteCpuUtilAlertState = true
|
||||||||
Network |
Deploy ExpressRoute Circuits Arp Availability Alert Policy to audit/deploy ExpressRoute Circuits Arp Availability Alert |
ERCIRArpAvailabilityWindowSize = PT5M ERCIRArpAvailabilityFrequency = PT1M ERCIRArpAvailabilityAlertSeverity = 0 ERCIRArpAvailabilityAlertState = true ERCIRArpAvailabilityThreshold = 90
|
||||||||
Network |
Deploy ExpressRoute Circuits Bgp Availability Alert Policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert |
ERCIRBgpAvailabilityEvaluationFrequency = PT1M ERCIRBgpAvailabilityThreshold = 90 ERCIRBgpAvailabilityWindowSize = PT5M ERCIRBgpAvailabilityAlertSeverity = 0 ERCIRBgpAvailabilityAlertState = true
|
||||||||
Network |
Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert Policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert |
ERCIRQoSDropBitsinPerSecFailingPeriods = 2 ERCIRQoSDropBitsinPerSecEvaluationFrequ... = PT5M ERCIRQoSDropBitsinPerSecWindowSize = PT5M ALZMonitorDisableTagValues = ["true", "Test", "Dev", "Sandbox"] ERCIRQoSDropBitsinPerSecAlertState = true ERCIRQoSDropBitsinPerSecEvaluationPeriods = 2 ERCIRQoSDropBitsinPerSecAlertSeverity = 2 ALZMonitorDisableTagName = MonitorDisable
|
||||||||
Network |
Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert Policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert |
ERCIRQoSDropBitsoutPerSecEvaluationFreq... = PT5M ERCIRQoSDropBitsoutPerSecFailingPeriods = 2 ERCIRQoSDropBitsoutPerSecEvaluationPeriods = 2 ERCIRQoSDropBitsoutPerSecAlertSeverity = 2 ERCIRQoSDropBitsoutPerSecAlertState = true ERCIRQoSDropBitsoutPerSecWindowSize = PT5M
|
||||||||
Network |
Deploy PDNSZ Capacity Utilization Alert Policy to audit/deploy Private DNS Zone Capacity Utilization Alert |
PDNSZCapacityUtilAlertSeverity = 2 PDNSZCapacityUtilAlertState = true PDNSZCapacityUtilThreshold = 80 PDNSZCapacityUtilWindowSize = PT1H PDNSZCapacityUtilEvaluationFrequency = PT1H
|
||||||||
Network |
Deploy PDNSZ Query Volume Alert Policy to audit/deploy Private DNS Zone Query Volume Alert |
PDNSZQueryVolumeAlertSeverity = 4 PDNSZQueryVolumeThreshold = 500 PDNSZQueryVolumeEvaluationFrequency = PT1H PDNSZQueryVolumeWindowSize = PT1H PDNSZQueryVolumeAlertState = true
|
||||||||
Network |
Deploy PDNSZ Record Set Capacity Alert Policy to audit/deploy Private DNS Zone Record Set Capacity Alert |
PDNSZRecordSetCapacityAlertState = true PDNSZRecordSetCapacityEvaluationFrequency = PT1H PDNSZRecordSetCapacityWindowSize = PT1H PDNSZRecordSetCapacityAlertSeverity = 2 PDNSZRecordSetCapacityThreshold = 80
|
||||||||
Network |
Deploy PDNSZ Registration Capacity Utilization Alert Policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert |
PDNSZRegistrationCapacityUtilEvaluation... = PT1H PDNSZRegistrationCapacityUtilAlertSeverity = 2 PDNSZRegistrationCapacityUtilWindowSize = PT1H PDNSZRegistrationCapacityUtilThreshold = 80 PDNSZRegistrationCapacityUtilAlertState = true
|
||||||||
Network |
Deploy PIP Bytes in DDoS Attack Alert Policy to audit/deploy PIP Bytes in DDoS Attack Alert |
PIPBytesInDDoSThreshold = 8000000 PIPBytesInDDoSAlertState = true PIPBytesInDDoSAlertSeverity = 4 PIPBytesInDDoSWindowSize = PT5M PIPBytesInDDoSEvaluationFrequency = PT5M
|
PIPBytesInDDoSThreshold = 8000000 PIPBytesInDDoSAlertState = true PIPBytesInDDoSAlertSeverity = 4 PIPBytesInDDoSWindowSize = PT5M PIPBytesInDDoSEvaluationFrequency = PT5M
|
|||||||
Network |
Deploy PIP DDoS Attack Alert Policy to audit/deploy PIP DDoS Attack Alert |
PIPDDoSAttackAlertState = true PIPDDoSAttackAlertSeverity = 1 PIPDDoSAttackEvaluationFrequency = PT5M PIPDDoSAttackThreshold = 0 PIPDDoSAttackWindowSize = PT5M
|
PIPDDoSAttackAlertState = true PIPDDoSAttackAlertSeverity = 1 PIPDDoSAttackEvaluationFrequency = PT5M PIPDDoSAttackThreshold = 0 PIPDDoSAttackWindowSize = PT5M
|
|||||||
Network |
Deploy PIP Packets in DDoS Attack Alert Policy to audit/deploy PIP Packets in DDoS Attack Alert |
PIPPacketsInDDoSAlertSeverity = 4 PIPPacketsInDDoSThreshold = 40000 PIPPacketsInDDoSWindowSize = PT5M PIPPacketsInDDoSEvaluationFrequency = PT5M PIPPacketsInDDoSAlertState = true
|
PIPPacketsInDDoSAlertSeverity = 4 PIPPacketsInDDoSThreshold = 40000 PIPPacketsInDDoSWindowSize = PT5M PIPPacketsInDDoSEvaluationFrequency = PT5M PIPPacketsInDDoSAlertState = true
|
|||||||
Network |
Deploy PIP VIP Availability Alert Policy to audit/deploy PIP VIP Availability Alert |
PIPVIPAvailabilityWindowSize = PT5M PIPVIPAvailabilityAlertSeverity = 1 PIPVIPAvailabilityEvaluationFrequency = PT1M PIPVIPAvailabilityAlertState = true PIPVIPAvailabilityThreshold = 1
|
PIPVIPAvailabilityWindowSize = PT5M PIPVIPAvailabilityAlertSeverity = 1 PIPVIPAvailabilityEvaluationFrequency = PT1M PIPVIPAvailabilityAlertState = true PIPVIPAvailabilityThreshold = 1
|
|||||||
Network |
Deploy VNet DDoS Attack Alert Policy to audit/deploy Virtual Network DDoS Attack Alert |
VNETDDOSAttackEvaluationFrequency = PT1M VNETDDOSAttackAlertSeverity = 1 VNETDDOSAttackWindowSize = PT5M VNETDDOSAttackThreshold = 1 VNETDDOSAttackAlertState = true
|
VNETDDOSAttackEvaluationFrequency = PT1M VNETDDOSAttackAlertSeverity = 1 VNETDDOSAttackWindowSize = PT5M VNETDDOSAttackThreshold = 1 VNETDDOSAttackAlertState = true
|
|||||||
Network |
Deploy VNetG Egress Packet Drop Count Alert Policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert |
VnetGwTunnelEgressPacketDropCountEvalua... = 4 VnetGwTunnelEgressPacketDropCountAlertS... = 1 VnetGwTunnelEgressPacketDropCountFailin... = 4 VnetGwTunnelEgressPacketDropCountEvalua... = PT5M VnetGwTunnelEgressPacketDropCountWindow... = PT5M VnetGwTunnelEgressPacketDropCountAlertS... = true
|
||||||||
Network |
Deploy VNetG Egress Packet Drop Mismatch Alert Policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert |
VnetGwTunnelEgressPacketDropMismatchEva... = PT5M VnetGwTunnelEgressPacketDropMismatchEva... = 4 VnetGwTunnelEgressPacketDropMismatchAle... = true VnetGwTunnelEgressPacketDropMismatchWin... = PT5M VnetGwTunnelEgressPacketDropMismatchFai... = 4 VnetGwTunnelEgressPacketDropMismatchAle... = 3
|
||||||||
Network |
Deploy VNetG ExpressRoute Bits Per Second Alert Policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert |
VnetGwExpressRouteBitsPerSecondAlertState = true VnetGwExpressRouteBitsPerSecondEvaluati... = PT1M VnetGwExpressRouteBitsPerSecondAlertSev... = 0 VnetGwExpressRouteBitsPerSecondThreshold = 1 VnetGwExpressRouteBitsPerSecondWindowSize = PT5M
|
||||||||
Network |
Deploy VNetG ExpressRoute CPU Utilization Alert Policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert |
VnetGwERCpuUtilAlertState = true VnetGwERCpuUtilEvaluationFrequency = PT1M VnetGwERCpuUtilWindowSize = PT5M VnetGwERCpuUtilThreshold = 80 VnetGwERCpuUtilAlertSeverity = 3
|
||||||||
Network |
Deploy VNetG Ingress Packet Drop Count Alert Policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert |
VnetGwTunnelIngressPacketDropCountFaili... = 4 VnetGwTunnelIngressPacketDropCountAlert... = true VnetGwTunnelIngressPacketDropCountAlert... = 3 VnetGwTunnelIngressPacketDropCountEvalu... = PT5M VnetGwTunnelIngressPacketDropCountWindo... = PT5M VnetGwTunnelIngressPacketDropCountEvalu... = 4
|
||||||||
Network |
Deploy VNetG Ingress Packet Drop Mismatch Alert Policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert |
VnetGwTunnelIngressPacketDropMismatchWi... = PT5M VnetGwTunnelIngressPacketDropMismatchAl... = 3 VnetGwTunnelIngressPacketDropMismatchAl... = true VnetGwTunnelIngressPacketDropMismatchEv... = PT5M VnetGwTunnelIngressPacketDropMismatchEv... = 4 VnetGwTunnelIngressPacketDropMismatchFa... = 4
|
||||||||
Network |
Deploy VNetG Tunnel Bandwidth Alert Policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert |
VnetGwTunnelBWEvaluationFrequency = PT1M VnetGwTunnelBWAlertSeverity = 0 VnetGwTunnelBWThreshold = 1 VnetGwTunnelBWAlertState = true VnetGwTunnelBWWindowSize = PT5M
|
||||||||
Network |
Deploy VNetG Tunnel Egress Alert Policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert |
VnetGwTunnelEgressAlertSeverity = 0 VnetGwTunnelEgressThreshold = 1 VnetGwTunnelEgressWindowSize = PT5M VnetGwTunnelEgressEvaluationFrequency = PT5M VnetGwTunnelEgressAlertState = true
|
||||||||
Network |
Deploy VNetG Tunnel Ingress Alert Policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert |
VnetGwTunnelIngressAlertSeverity = 0 VnetGwTunnelIngressEvaluationFrequency = PT5M VnetGwTunnelIngressAlertState = true VnetGwTunnelIngressThreshold = 1 VnetGwTunnelIngressWindowSize = PT5M
|
||||||||
Network |
Deploy VPNG BGP Peer Status Alert Policy to audit/deploy VPN Gateway BGP Peer Status Alert |
VPNGwBGPPeerStatusThreshold = 1 VPNGwBGPPeerStatusAlertState = true VPNGwBGPPeerStatusEvaluationFrequency = PT5M VPNGwBGPPeerStatusWindowSize = PT5M VPNGwBGPPeerStatusAlertSeverity = 3
|
||||||||
Network |
Deploy VPNG Bandwidth Utilization Alert Policy to audit/deploy VPN Gateway Bandwidth Utilization Alert |
VPNGWBandWidthUtilAlertState = true VPNGWBandWidthUtilThreshold = 1 VPNGWBandWidthUtilEvaluationFrequency = PT5M VPNGWBandWidthUtilWindowSize = PT5M VPNGWBandWidthUtilAlertSeverity = 0
|
||||||||
Network |
Deploy VPNG Egress Alert Policy to audit/deploy VPN Gateway Egress Alert |
VPNGWEgressWindowSize = PT5M VPNGWEgressEvaluationFrequency = PT5M VPNGWEgressThreshold = 1 VPNGWEgressAlertSeverity = 0 VPNGWEgressAlertState = true
|
||||||||
Network |
Deploy VPNG Egress Packet Drop Count Alert Policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert |
VPNGWTunnelEgressPacketDropCountAlertSe... = 3 VPNGWTunnelEgressPacketDropCountWindowSize = PT5M VPNGWTunnelEgressPacketDropCountAlertState = true VPNGWTunnelEgressPacketDropCountEvaluat... = 2 VPNGWTunnelEgressPacketDropCountFailing... = 2 VPNGWTunnelEgressPacketDropCountFrequency = PT5M
|
||||||||
Network |
Deploy VPNG Egress Packet Drop Mismatch Alert Policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert |
VPNGWTunnelEgressPacketDropMismatchFail... = 2 VPNGWTunnelEgressPacketDropMismatchAler... = true VPNGWTunnelEgressPacketDropMismatchEval... = 2 VPNGWTunnelEgressPacketDropMismatchWind... = PT5M VPNGWTunnelEgressPacketDropMismatchAler... = 3 VPNGWTunnelEgressPacketDropMismatchFreq... = PT5M
|
||||||||
Network |
Deploy VPNG Ingress Alert Policy to audit/deploy VPN Gateway Ingress Alert |
VPNGWIngressThreshold = 1 VPNGWIngressEvaluationFrequency = PT5M VPNGWIngressWindowSize = PT5M VPNGWIngressAlertState = true VPNGWIngressAlertSeverity = 0 VPNGWIngressAutoMitigate = true
|
||||||||
Network |
Deploy VPNG Ingress Packet Drop Count Alert Policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert |
VPNGWTunnelIngressPacketDropCountFailin... = 4 VPNGWTunnelIngressPacketDropCountEvalua... = 4 VPNGWTunnelIngressPacketDropCountAlertS... = 3 VPNGWTunnelIngressPacketDropCountAlertS... = true VPNGWTunnelIngressPacketDropCountWindow... = PT5M VPNGWTunnelIngressPacketDropCountFrequency = PT5M
|
||||||||
Network |
Deploy VPNG Ingress Packet Drop Mismatch Alert Policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert |
VPNGWTunnelIngressPacketDropMismatchAle... = true VPNGWTunnelIngressPacketDropMismatchWin... = PT5M VPNGWTunnelIngressPacketDropMismatchAle... = 3 VPNGWTunnelIngressPacketDropMismatchEva... = 4 VPNGWTunnelIngressPacketDropMismatchFai... = 4 VPNGWTunnelIngressPacketDropMismatchFre... = PT5M
|
||||||||
Network |
Enforce specific configuration of Network Security Groups (NSG) This policy enforces the configuration of Network Security Groups (NSG). |
modifyNsgRulePriority = 1000 modifyNsgRuleName = DenyAnyInternetOutbound modifyNsgRuleDirection = Outbound modifyNsgRuleProtocol = * modifyNsgRuleDestinationPortRange = * modifyNsgRuleSourcePortRange = * modifyNsgRuleAccess = Deny modifyNsgRuleDescription = Deny any outbound traffic to the Internet modifyNsgRuleSourceAddressPrefix = * modifyNsgRuleDestinationAddressPrefix = Internet
|
modifyNsgRulePriority = 1000 modifyNsgRuleName = DenyAnyInternetOutbound modifyNsgRuleDirection = Outbound modifyNsgRuleProtocol = * modifyNsgRuleDestinationPortRange = * modifyNsgRuleSourcePortRange = * modifyNsgRuleAccess = Deny modifyNsgRuleDescription = Deny any outbound traffic to the Internet modifyNsgRuleSourceAddressPrefix = * modifyNsgRuleDestinationAddressPrefix = Internet
|
|||||||
Network |
Enforce specific configuration of User-Defined Routes (UDR) This policy enforces the configuration of User-Defined Routes (UDR) within a subnet. |
modifyUdrAddressPrefix = 0.0.0.0/0 modifyUdrNextHopIpAddress = `` modifyUdrNextHopType = None
|
modifyUdrAddressPrefix = 0.0.0.0/0 modifyUdrNextHopIpAddress = `` modifyUdrNextHopType = None
|
|||||||
Network |
Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. |
denyMgmtFromInternetPorts = ["22", "3389"]
|
denyMgmtFromInternetPorts = ["22", "3389"]
|
|||||||
Network |
Network Watcher should be enabled Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Scenario level monitoring enables you to diagnose problems at an end to end network level view. It is required to have a network watcher resource group to be created in every region where a virtual network is present. An alert is enabled if a network watcher resource group is not available in a particular region. |
networkWatcherShouldBeEnabledResourceGr... = NetworkWatcherRG
|
||||||||
Network |
Virtual networks should be protected by Azure DDoS Protection Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs. |
ddosPlanResourceId = `` | ddosPlanResourceId = `` | |||||||
Network |
Web Application Firewall (WAF) should use the specified mode for Application Gateway Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Application Gateway. |
wafModeAppGwRequirement = Prevention
|
wafModeAppGwRequirement = Prevention
|
|||||||
Network |
Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Azure Front Door Service. |
wafModeRequirement = Prevention
|
wafModeRequirement = Prevention
|