Network - oWretch/policy GitHub Wiki

Policy Effects by Policy

Category Policy Platform Landing Zones Production Decommissioned Management Corp Connectivity Sandbox Identity
Network [Deprecated]: Azure firewall policy should enable TLS inspection within application rules
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Azure Firewall Premium should configure a valid intermediate certificate to enable TLS inspection
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Bypass list of Intrusion Detection and Prevention System (IDPS) should be empty in Firewall Policy Premium
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Firewall Policy Premium should enable all IDPS signature rules to monitor all inbound and outbound traffic flows
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Firewall Policy Premium should enable the Intrusion Detection and Prevention System (IDPS)
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Web Application Firewall (WAF) should enable all firewall rules for Application Gateway
This policy is deprecated because sometimes it is impractical to enable all WAF rules. Instead of continuing to use this policy, we recommend you instead assign this replacement policy with policy ID 564feb30-bf6a-4854-b4bb-0d2d2d1e6c66. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Preview]: All Internet traffic should be routed via your deployed Azure Firewall
Azure Security Center has identified that some of your subnets aren't protected with a next generation firewall. Protect your subnets from potential threats by restricting access to them with Azure Firewall or a supported next generation firewall
AuditIfNotExists
Disabled
Network Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2
This policy enables you to restrict that Application Gateways is always deployed with predefined Microsoft policy that is using TLS version 1.2
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Azure Web Application Firewall should be enabled for Azure Front Door entry-points
Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Network Deny or Audit service endpoints on subnets
This Policy will deny/audit Service Endpoints on subnets. Service Endpoints allows the network traffic to bypass Network appliances, such as the Azure Firewall.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Deny vNet peering cross subscription.
This policy denies the creation of vNet Peerings outside of the same subscriptions under the assigned scope.
Deny
Disabled
Audit
Network Deploy Activity Log Azure FireWall Delete Alert
Policy to Deploy Activity Log Azure Firewall Delete Alert
deployIfNotExists
disabled
Network Deploy Activity Log NSG Delete Alert
Policy to Deploy Activity Log NSG Delete Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy Activity Log Route Table Update Alert
Policy to Deploy Activity Log Route Table Update Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy Activity Log VPN Gateway Delete Alert
Policy to Deploy Activity Log VPN Gateway Delete Alert
deployIfNotExists
disabled
Network Deploy AFW FirewallHealth Alert
Policy to audit/deploy Azure Firewall FirewallHealth Alert
deployIfNotExists
disabled
Network Deploy AFW SNATPortUtilization Alert
Policy to audit/deploy Azure Firewall SNATPortUtilization Alert
deployIfNotExists
disabled
Network Deploy ERG ExpressRoute Bits In Alert
Policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert
disabled
deployIfNotExists
Network Deploy ERG ExpressRoute Bits Out Alert
Policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert
disabled
deployIfNotExists
Network Deploy ERG ExpressRoute CPU Utilization Alert
Policy to audit/deploy ER Gateway Express Route CPU Utilization Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits Arp Availability Alert
Policy to audit/deploy ExpressRoute Circuits Arp Availability Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits Bgp Availability Alert
Policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert
Policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert
Policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert
deployIfNotExists
disabled
Network Deploy PDNSZ Capacity Utilization Alert
Policy to audit/deploy Private DNS Zone Capacity Utilization Alert
deployIfNotExists
disabled
Network Deploy PDNSZ Query Volume Alert
Policy to audit/deploy Private DNS Zone Query Volume Alert
disabled
deployIfNotExists
Network Deploy PDNSZ Record Set Capacity Alert
Policy to audit/deploy Private DNS Zone Record Set Capacity Alert
deployIfNotExists
disabled
Network Deploy PDNSZ Registration Capacity Utilization Alert
Policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert
deployIfNotExists
disabled
Network Deploy PIP Bytes in DDoS Attack Alert
Policy to audit/deploy PIP Bytes in DDoS Attack Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
Network Deploy PIP DDoS Attack Alert
Policy to audit/deploy PIP DDoS Attack Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy PIP Packets in DDoS Attack Alert
Policy to audit/deploy PIP Packets in DDoS Attack Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
Network Deploy PIP VIP Availability Alert
Policy to audit/deploy PIP VIP Availability Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy VNet DDoS Attack Alert
Policy to audit/deploy Virtual Network DDoS Attack Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy VNetG Egress Packet Drop Count Alert
Policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VNetG Egress Packet Drop Mismatch Alert
Policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Deploy VNetG ExpressRoute Bits Per Second Alert
Policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert
deployIfNotExists
disabled
Network Deploy VNetG ExpressRoute CPU Utilization Alert
Policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert
deployIfNotExists
disabled
Network Deploy VNetG Ingress Packet Drop Count Alert
Policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VNetG Ingress Packet Drop Mismatch Alert
Policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Deploy VNetG Tunnel Bandwidth Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert
deployIfNotExists
disabled
Network Deploy VNetG Tunnel Egress Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert
disabled
deployIfNotExists
Network Deploy VNetG Tunnel Ingress Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert
disabled
deployIfNotExists
Network Deploy VPNG BGP Peer Status Alert
Policy to audit/deploy VPN Gateway BGP Peer Status Alert
deployIfNotExists
disabled
Network Deploy VPNG Bandwidth Utilization Alert
Policy to audit/deploy VPN Gateway Bandwidth Utilization Alert
deployIfNotExists
disabled
Network Deploy VPNG Egress Alert
Policy to audit/deploy VPN Gateway Egress Alert
disabled
deployIfNotExists
Network Deploy VPNG Egress Packet Drop Count Alert
Policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VPNG Egress Packet Drop Mismatch Alert
Policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Deploy VPNG Ingress Alert
Policy to audit/deploy VPN Gateway Ingress Alert
disabled
deployIfNotExists
Network Deploy VPNG Ingress Packet Drop Count Alert
Policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VPNG Ingress Packet Drop Mismatch Alert
Policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Enforce specific configuration of Network Security Groups (NSG)
This policy enforces the configuration of Network Security Groups (NSG).
Disabled
Modify
Disabled
Modify
Network Enforce specific configuration of User-Defined Routes (UDR)
This policy enforces the configuration of User-Defined Routes (UDR) within a subnet.
Disabled
Modify
Disabled
Modify
Network Gateway subnets should not be configured with a network security group
This policy denies if a gateway subnet is configured with a network security group. Assigning a network security group to a gateway subnet will cause the gateway to stop functioning.
deny deny
Network Management port access from the Internet should be blocked
This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Network interfaces should disable IP forwarding
This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team.
deny deny
Network Network interfaces should not have public IPs
This policy denies the network interfaces which are configured with any public IP. Public IP addresses allow internet resources to communicate inbound to Azure resources, and Azure resources to communicate outbound to the internet. This should be reviewed by the network security team.
deny deny
Network Network Watcher should be enabled
Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Scenario level monitoring enables you to diagnose problems at an end to end network level view. It is required to have a network watcher resource group to be created in every region where a virtual network is present. An alert is enabled if a network watcher resource group is not available in a particular region.
AuditIfNotExists
Disabled
Network Subnets should have a Network Security Group
This policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Subnets should have a User Defined Route
This policy denies the creation of a subnet without a User Defined Route (UDR).
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Virtual networks should be protected by Azure DDoS Protection
Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs.
Modify
Disabled
Audit
Modify
Disabled
Audit
Network VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users
Disabling local authentication methods improves security by ensuring that VPN Gateways use only Azure Active Directory identities for authentication. Learn more about Azure AD authentication at https://docs.microsoft.com/azure/vpn-gateway/openvpn-azure-ad-tenant
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Network Web Application Firewall (WAF) should be enabled for Application Gateway
Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Network Web Application Firewall (WAF) should use the specified mode for Application Gateway
Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Application Gateway.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service
Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Azure Front Door Service.
Deny
Disabled
Audit
Deny
Disabled
Audit

Policy Parameters by Policy

Category Policy Platform Landing Zones Production Decommissioned Management Corp Connectivity Sandbox Identity
Network Deploy Activity Log Azure FireWall Delete Alert
Policy to Deploy Activity Log Azure Firewall Delete Alert
ALZMonitorResourceGroupLocation = eastus
activityFWDeleteAlertState = true
ALZMonitorResourceGroupName = rg-amba-monitoring-001
ALZMonitorResourceGroupTags = {"Project":"amba-monitoring"}
Network Deploy Activity Log NSG Delete Alert
Policy to Deploy Activity Log NSG Delete Alert
activityNSGDeleteAlertState = true activityNSGDeleteAlertState = true
Network Deploy Activity Log Route Table Update Alert
Policy to Deploy Activity Log Route Table Update Alert
activityUDRUpdateAlertState = true activityUDRUpdateAlertState = true
Network Deploy Activity Log VPN Gateway Delete Alert
Policy to Deploy Activity Log VPN Gateway Delete Alert
activityVPNGWDeleteAlertState = true
Network Deploy AFW FirewallHealth Alert
Policy to audit/deploy Azure Firewall FirewallHealth Alert
FirewallHealthWindowSize = PT5M
FirewallHealthThreshold = 90
FirewallHealthAlertSeverity = 0
FirewallHealthAlertState = true
FirewallHealthEvaluationFrequency = PT1M
Network Deploy AFW SNATPortUtilization Alert
Policy to audit/deploy Azure Firewall SNATPortUtilization Alert
AFWSNATPortUtilizationWindowSize = PT5M
AFWSNATPortUtilizationFrequency = PT1M
AFWSNATPortUtilizationAlertState = true
AFWSNATPortUtilizationThreshold = 80
AFWSNATPortUtilizationAlertSeverity = 1
Network Deploy ERG ExpressRoute Bits In Alert
Policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert
ERGwExpressRouteBitsInAlertState = true
ERGwExpressRouteBitsInEvaluationFrequency = PT5M
ERGwExpressRouteBitsInThreshold = 1
ERGwExpressRouteBitsInWindowSize = PT5M
ERGwExpressRouteBitsInAlertSeverity = 0
Network Deploy ERG ExpressRoute Bits Out Alert
Policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert
ERGwExpressRouteBitsOutThreshold = 1
ERGwExpressRouteBitsOutAlertState = true
ERGwExpressRouteBitsOutWindowSize = PT5M
ERGwExpressRouteBitsOutAlertSeverity = 0
ERGwExpressRouteBitsOutEvaluationFrequency = PT5M
Network Deploy ERG ExpressRoute CPU Utilization Alert
Policy to audit/deploy ER Gateway Express Route CPU Utilization Alert
ERGwExpressRouteCpuUtilWindowSize = PT5M
ERGwExpressRouteCpuUtilEvaluationFrequency = PT1M
ERGwExpressRouteCpuUtilAlertSeverity = 1
ERGwExpressRouteCpuUtilThreshold = 80
ERGwExpressRouteCpuUtilAlertState = true
Network Deploy ExpressRoute Circuits Arp Availability Alert
Policy to audit/deploy ExpressRoute Circuits Arp Availability Alert
ERCIRArpAvailabilityWindowSize = PT5M
ERCIRArpAvailabilityFrequency = PT1M
ERCIRArpAvailabilityAlertSeverity = 0
ERCIRArpAvailabilityAlertState = true
ERCIRArpAvailabilityThreshold = 90
Network Deploy ExpressRoute Circuits Bgp Availability Alert
Policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert
ERCIRBgpAvailabilityEvaluationFrequency = PT1M
ERCIRBgpAvailabilityThreshold = 90
ERCIRBgpAvailabilityWindowSize = PT5M
ERCIRBgpAvailabilityAlertSeverity = 0
ERCIRBgpAvailabilityAlertState = true
Network Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert
Policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert
ERCIRQoSDropBitsinPerSecFailingPeriods = 2
ERCIRQoSDropBitsinPerSecEvaluationFrequ... = PT5M
ERCIRQoSDropBitsinPerSecWindowSize = PT5M
ALZMonitorDisableTagValues = ["true", "Test", "Dev", "Sandbox"]
ERCIRQoSDropBitsinPerSecAlertState = true
ERCIRQoSDropBitsinPerSecEvaluationPeriods = 2
ERCIRQoSDropBitsinPerSecAlertSeverity = 2
ALZMonitorDisableTagName = MonitorDisable
Network Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert
Policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert
ERCIRQoSDropBitsoutPerSecEvaluationFreq... = PT5M
ERCIRQoSDropBitsoutPerSecFailingPeriods = 2
ERCIRQoSDropBitsoutPerSecEvaluationPeriods = 2
ERCIRQoSDropBitsoutPerSecAlertSeverity = 2
ERCIRQoSDropBitsoutPerSecAlertState = true
ERCIRQoSDropBitsoutPerSecWindowSize = PT5M
Network Deploy PDNSZ Capacity Utilization Alert
Policy to audit/deploy Private DNS Zone Capacity Utilization Alert
PDNSZCapacityUtilAlertSeverity = 2
PDNSZCapacityUtilAlertState = true
PDNSZCapacityUtilThreshold = 80
PDNSZCapacityUtilWindowSize = PT1H
PDNSZCapacityUtilEvaluationFrequency = PT1H
Network Deploy PDNSZ Query Volume Alert
Policy to audit/deploy Private DNS Zone Query Volume Alert
PDNSZQueryVolumeAlertSeverity = 4
PDNSZQueryVolumeThreshold = 500
PDNSZQueryVolumeEvaluationFrequency = PT1H
PDNSZQueryVolumeWindowSize = PT1H
PDNSZQueryVolumeAlertState = true
Network Deploy PDNSZ Record Set Capacity Alert
Policy to audit/deploy Private DNS Zone Record Set Capacity Alert
PDNSZRecordSetCapacityAlertState = true
PDNSZRecordSetCapacityEvaluationFrequency = PT1H
PDNSZRecordSetCapacityWindowSize = PT1H
PDNSZRecordSetCapacityAlertSeverity = 2
PDNSZRecordSetCapacityThreshold = 80
Network Deploy PDNSZ Registration Capacity Utilization Alert
Policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert
PDNSZRegistrationCapacityUtilEvaluation... = PT1H
PDNSZRegistrationCapacityUtilAlertSeverity = 2
PDNSZRegistrationCapacityUtilWindowSize = PT1H
PDNSZRegistrationCapacityUtilThreshold = 80
PDNSZRegistrationCapacityUtilAlertState = true
Network Deploy PIP Bytes in DDoS Attack Alert
Policy to audit/deploy PIP Bytes in DDoS Attack Alert
PIPBytesInDDoSThreshold = 8000000
PIPBytesInDDoSAlertState = true
PIPBytesInDDoSAlertSeverity = 4
PIPBytesInDDoSWindowSize = PT5M
PIPBytesInDDoSEvaluationFrequency = PT5M
PIPBytesInDDoSThreshold = 8000000
PIPBytesInDDoSAlertState = true
PIPBytesInDDoSAlertSeverity = 4
PIPBytesInDDoSWindowSize = PT5M
PIPBytesInDDoSEvaluationFrequency = PT5M
Network Deploy PIP DDoS Attack Alert
Policy to audit/deploy PIP DDoS Attack Alert
PIPDDoSAttackAlertState = true
PIPDDoSAttackAlertSeverity = 1
PIPDDoSAttackEvaluationFrequency = PT5M
PIPDDoSAttackThreshold = 0
PIPDDoSAttackWindowSize = PT5M
PIPDDoSAttackAlertState = true
PIPDDoSAttackAlertSeverity = 1
PIPDDoSAttackEvaluationFrequency = PT5M
PIPDDoSAttackThreshold = 0
PIPDDoSAttackWindowSize = PT5M
Network Deploy PIP Packets in DDoS Attack Alert
Policy to audit/deploy PIP Packets in DDoS Attack Alert
PIPPacketsInDDoSAlertSeverity = 4
PIPPacketsInDDoSThreshold = 40000
PIPPacketsInDDoSWindowSize = PT5M
PIPPacketsInDDoSEvaluationFrequency = PT5M
PIPPacketsInDDoSAlertState = true
PIPPacketsInDDoSAlertSeverity = 4
PIPPacketsInDDoSThreshold = 40000
PIPPacketsInDDoSWindowSize = PT5M
PIPPacketsInDDoSEvaluationFrequency = PT5M
PIPPacketsInDDoSAlertState = true
Network Deploy PIP VIP Availability Alert
Policy to audit/deploy PIP VIP Availability Alert
PIPVIPAvailabilityWindowSize = PT5M
PIPVIPAvailabilityAlertSeverity = 1
PIPVIPAvailabilityEvaluationFrequency = PT1M
PIPVIPAvailabilityAlertState = true
PIPVIPAvailabilityThreshold = 1
PIPVIPAvailabilityWindowSize = PT5M
PIPVIPAvailabilityAlertSeverity = 1
PIPVIPAvailabilityEvaluationFrequency = PT1M
PIPVIPAvailabilityAlertState = true
PIPVIPAvailabilityThreshold = 1
Network Deploy VNet DDoS Attack Alert
Policy to audit/deploy Virtual Network DDoS Attack Alert
VNETDDOSAttackEvaluationFrequency = PT1M
VNETDDOSAttackAlertSeverity = 1
VNETDDOSAttackWindowSize = PT5M
VNETDDOSAttackThreshold = 1
VNETDDOSAttackAlertState = true
VNETDDOSAttackEvaluationFrequency = PT1M
VNETDDOSAttackAlertSeverity = 1
VNETDDOSAttackWindowSize = PT5M
VNETDDOSAttackThreshold = 1
VNETDDOSAttackAlertState = true
Network Deploy VNetG Egress Packet Drop Count Alert
Policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert
VnetGwTunnelEgressPacketDropCountEvalua... = 4
VnetGwTunnelEgressPacketDropCountAlertS... = 1
VnetGwTunnelEgressPacketDropCountFailin... = 4
VnetGwTunnelEgressPacketDropCountEvalua... = PT5M
VnetGwTunnelEgressPacketDropCountWindow... = PT5M
VnetGwTunnelEgressPacketDropCountAlertS... = true
Network Deploy VNetG Egress Packet Drop Mismatch Alert
Policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert
VnetGwTunnelEgressPacketDropMismatchEva... = PT5M
VnetGwTunnelEgressPacketDropMismatchEva... = 4
VnetGwTunnelEgressPacketDropMismatchAle... = true
VnetGwTunnelEgressPacketDropMismatchWin... = PT5M
VnetGwTunnelEgressPacketDropMismatchFai... = 4
VnetGwTunnelEgressPacketDropMismatchAle... = 3
Network Deploy VNetG ExpressRoute Bits Per Second Alert
Policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert
VnetGwExpressRouteBitsPerSecondAlertState = true
VnetGwExpressRouteBitsPerSecondEvaluati... = PT1M
VnetGwExpressRouteBitsPerSecondAlertSev... = 0
VnetGwExpressRouteBitsPerSecondThreshold = 1
VnetGwExpressRouteBitsPerSecondWindowSize = PT5M
Network Deploy VNetG ExpressRoute CPU Utilization Alert
Policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert
VnetGwERCpuUtilAlertState = true
VnetGwERCpuUtilEvaluationFrequency = PT1M
VnetGwERCpuUtilWindowSize = PT5M
VnetGwERCpuUtilThreshold = 80
VnetGwERCpuUtilAlertSeverity = 3
Network Deploy VNetG Ingress Packet Drop Count Alert
Policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert
VnetGwTunnelIngressPacketDropCountFaili... = 4
VnetGwTunnelIngressPacketDropCountAlert... = true
VnetGwTunnelIngressPacketDropCountAlert... = 3
VnetGwTunnelIngressPacketDropCountEvalu... = PT5M
VnetGwTunnelIngressPacketDropCountWindo... = PT5M
VnetGwTunnelIngressPacketDropCountEvalu... = 4
Network Deploy VNetG Ingress Packet Drop Mismatch Alert
Policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert
VnetGwTunnelIngressPacketDropMismatchWi... = PT5M
VnetGwTunnelIngressPacketDropMismatchAl... = 3
VnetGwTunnelIngressPacketDropMismatchAl... = true
VnetGwTunnelIngressPacketDropMismatchEv... = PT5M
VnetGwTunnelIngressPacketDropMismatchEv... = 4
VnetGwTunnelIngressPacketDropMismatchFa... = 4
Network Deploy VNetG Tunnel Bandwidth Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert
VnetGwTunnelBWEvaluationFrequency = PT1M
VnetGwTunnelBWAlertSeverity = 0
VnetGwTunnelBWThreshold = 1
VnetGwTunnelBWAlertState = true
VnetGwTunnelBWWindowSize = PT5M
Network Deploy VNetG Tunnel Egress Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert
VnetGwTunnelEgressAlertSeverity = 0
VnetGwTunnelEgressThreshold = 1
VnetGwTunnelEgressWindowSize = PT5M
VnetGwTunnelEgressEvaluationFrequency = PT5M
VnetGwTunnelEgressAlertState = true
Network Deploy VNetG Tunnel Ingress Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert
VnetGwTunnelIngressAlertSeverity = 0
VnetGwTunnelIngressEvaluationFrequency = PT5M
VnetGwTunnelIngressAlertState = true
VnetGwTunnelIngressThreshold = 1
VnetGwTunnelIngressWindowSize = PT5M
Network Deploy VPNG BGP Peer Status Alert
Policy to audit/deploy VPN Gateway BGP Peer Status Alert
VPNGwBGPPeerStatusThreshold = 1
VPNGwBGPPeerStatusAlertState = true
VPNGwBGPPeerStatusEvaluationFrequency = PT5M
VPNGwBGPPeerStatusWindowSize = PT5M
VPNGwBGPPeerStatusAlertSeverity = 3
Network Deploy VPNG Bandwidth Utilization Alert
Policy to audit/deploy VPN Gateway Bandwidth Utilization Alert
VPNGWBandWidthUtilAlertState = true
VPNGWBandWidthUtilThreshold = 1
VPNGWBandWidthUtilEvaluationFrequency = PT5M
VPNGWBandWidthUtilWindowSize = PT5M
VPNGWBandWidthUtilAlertSeverity = 0
Network Deploy VPNG Egress Alert
Policy to audit/deploy VPN Gateway Egress Alert
VPNGWEgressWindowSize = PT5M
VPNGWEgressEvaluationFrequency = PT5M
VPNGWEgressThreshold = 1
VPNGWEgressAlertSeverity = 0
VPNGWEgressAlertState = true
Network Deploy VPNG Egress Packet Drop Count Alert
Policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert
VPNGWTunnelEgressPacketDropCountAlertSe... = 3
VPNGWTunnelEgressPacketDropCountWindowSize = PT5M
VPNGWTunnelEgressPacketDropCountAlertState = true
VPNGWTunnelEgressPacketDropCountEvaluat... = 2
VPNGWTunnelEgressPacketDropCountFailing... = 2
VPNGWTunnelEgressPacketDropCountFrequency = PT5M
Network Deploy VPNG Egress Packet Drop Mismatch Alert
Policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert
VPNGWTunnelEgressPacketDropMismatchFail... = 2
VPNGWTunnelEgressPacketDropMismatchAler... = true
VPNGWTunnelEgressPacketDropMismatchEval... = 2
VPNGWTunnelEgressPacketDropMismatchWind... = PT5M
VPNGWTunnelEgressPacketDropMismatchAler... = 3
VPNGWTunnelEgressPacketDropMismatchFreq... = PT5M
Network Deploy VPNG Ingress Alert
Policy to audit/deploy VPN Gateway Ingress Alert
VPNGWIngressThreshold = 1
VPNGWIngressEvaluationFrequency = PT5M
VPNGWIngressWindowSize = PT5M
VPNGWIngressAlertState = true
VPNGWIngressAlertSeverity = 0
VPNGWIngressAutoMitigate = true
Network Deploy VPNG Ingress Packet Drop Count Alert
Policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert
VPNGWTunnelIngressPacketDropCountFailin... = 4
VPNGWTunnelIngressPacketDropCountEvalua... = 4
VPNGWTunnelIngressPacketDropCountAlertS... = 3
VPNGWTunnelIngressPacketDropCountAlertS... = true
VPNGWTunnelIngressPacketDropCountWindow... = PT5M
VPNGWTunnelIngressPacketDropCountFrequency = PT5M
Network Deploy VPNG Ingress Packet Drop Mismatch Alert
Policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert
VPNGWTunnelIngressPacketDropMismatchAle... = true
VPNGWTunnelIngressPacketDropMismatchWin... = PT5M
VPNGWTunnelIngressPacketDropMismatchAle... = 3
VPNGWTunnelIngressPacketDropMismatchEva... = 4
VPNGWTunnelIngressPacketDropMismatchFai... = 4
VPNGWTunnelIngressPacketDropMismatchFre... = PT5M
Network Enforce specific configuration of Network Security Groups (NSG)
This policy enforces the configuration of Network Security Groups (NSG).
modifyNsgRulePriority = 1000
modifyNsgRuleName = DenyAnyInternetOutbound
modifyNsgRuleDirection = Outbound
modifyNsgRuleProtocol = *
modifyNsgRuleDestinationPortRange = *
modifyNsgRuleSourcePortRange = *
modifyNsgRuleAccess = Deny
modifyNsgRuleDescription = Deny any outbound traffic to the Internet
modifyNsgRuleSourceAddressPrefix = *
modifyNsgRuleDestinationAddressPrefix = Internet
modifyNsgRulePriority = 1000
modifyNsgRuleName = DenyAnyInternetOutbound
modifyNsgRuleDirection = Outbound
modifyNsgRuleProtocol = *
modifyNsgRuleDestinationPortRange = *
modifyNsgRuleSourcePortRange = *
modifyNsgRuleAccess = Deny
modifyNsgRuleDescription = Deny any outbound traffic to the Internet
modifyNsgRuleSourceAddressPrefix = *
modifyNsgRuleDestinationAddressPrefix = Internet
Network Enforce specific configuration of User-Defined Routes (UDR)
This policy enforces the configuration of User-Defined Routes (UDR) within a subnet.
modifyUdrAddressPrefix = 0.0.0.0/0
modifyUdrNextHopIpAddress = ``
modifyUdrNextHopType = None
modifyUdrAddressPrefix = 0.0.0.0/0
modifyUdrNextHopIpAddress = ``
modifyUdrNextHopType = None
Network Management port access from the Internet should be blocked
This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports.
denyMgmtFromInternetPorts = ["22", "3389"] denyMgmtFromInternetPorts = ["22", "3389"]
Network Network Watcher should be enabled
Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Scenario level monitoring enables you to diagnose problems at an end to end network level view. It is required to have a network watcher resource group to be created in every region where a virtual network is present. An alert is enabled if a network watcher resource group is not available in a particular region.
networkWatcherShouldBeEnabledResourceGr... = NetworkWatcherRG
Network Virtual networks should be protected by Azure DDoS Protection
Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs.
ddosPlanResourceId = `` ddosPlanResourceId = ``
Network Web Application Firewall (WAF) should use the specified mode for Application Gateway
Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Application Gateway.
wafModeAppGwRequirement = Prevention wafModeAppGwRequirement = Prevention
Network Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service
Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Azure Front Door Service.
wafModeRequirement = Prevention wafModeRequirement = Prevention
⚠️ **GitHub.com Fallback** ⚠️