You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/dns-details.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,11 @@
1
1
---
2
2
title: Azure Firewall DNS Proxy details
3
-
description: Learn how Azure Firewall DNS Proxy works
4
-
services: firewall
3
+
description: Learn about Azure Firewall DNS proxy implementation details, including FQDN caching behavior, TTL handling, and how DNS proxy affects network rule filtering.
5
4
author: duongau
5
+
ms.author: duau
6
6
ms.service: azure-firewall
7
7
ms.topic: concept-article
8
-
ms.date: 06/11/2024
9
-
ms.author: duau
8
+
ms.date: 03/28/2026
10
9
# Customer intent: As a network administrator, I want to configure Azure Firewall as a DNS proxy, so that I can ensure consistent and reliable DNS resolution for client virtual machines in my network.
11
10
---
12
11
@@ -20,19 +19,19 @@ The following information describes some implementation details for Azure Firewa
20
19
21
20
Azure Firewall acts as a standard DNS client. If multiple A records are in the response, the firewall stores all the records in cache and offers them to the client in the response. If there’s one record per response, the firewall stores only a single record. There's no way for a client to know ahead of time if it should expect one or multiple A records in responses.
22
21
23
-
## FQDN Time to Live (TTL)
22
+
## FQDN time to live (TTL)
24
23
25
-
When a FQDN TTL (time-to-live) is about to expire, records are cached and expired according to their TTLs. Pre-fetching isn't used, so the firewall doesn't do a lookup before TTL expiration to refresh the record.
24
+
The firewall caches and expires records according to their TTLs. Because the firewall doesn't use prefetching, it doesn't do a lookup before TTL expiration to refresh the record.
26
25
27
26
## Clients not configured to use the firewall DNS proxy
28
27
29
-
If a client computer is configured to use a DNS server that isn't the firewall DNS proxy, the results can be unpredictable.
28
+
If you configure a client computer to use a DNS server that isn't the firewall DNS proxy, the results can be unpredictable.
30
29
31
-
For example, assume a client workload is in US East, and uses a primary DNS server hosted in US East. Azure Firewall DNS server settings are configured for a secondary DNS server hosted in US West. The firewall’s DNS server hosted in US West results in a response different than that of the client in US East.
30
+
For example, assume a client workload is in US East, and uses a primary DNS server hosted in US East. Azure Firewall DNS server settings are configured for a secondary DNS server hosted in US West. The firewall's DNS server hosted in US West results in a response different from that of the client in US East.
32
31
33
-
This is a common scenario, and why clients should use the firewall’s DNS proxy functionality. Clients should use the firewall as their resolver if you use FQDNs in Network rules. You can ensure IP address resolution consistency by clients and the firewall itself.
32
+
This scenario is common, and why clients should use the firewall's DNS proxy functionality. Clients should use the firewall as their resolver if you use FQDNs in Network rules. You can ensure IP address resolution consistency by clients and the firewall itself.
34
33
35
-
In this example, if an FQDN is configured in Network rules, the firewall resolves the FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and when the client resolves the same FQDN to IP2 because of a difference in DNS response, its connection attempt won't match the rules on the firewall and is denied.
34
+
In this example, if an FQDN is configured in Network rules, the firewall resolves the FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and when the client resolves the same FQDN to IP2 because of a difference in DNS response, its connection attempt doesn't match the rules on the firewall and is denied.
36
35
37
36
For HTTP/S FQDNs in Application rules, the firewall parses out the FQDN from the host or SNI header, resolves it, and then connects to that IP address. The destination IP address the client was trying to connect to is ignored.
Copy file name to clipboardExpand all lines: articles/firewall/firewall-azure-policy.md
+39-80Lines changed: 39 additions & 80 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,19 @@
1
1
---
2
2
title: Use Azure Policy to help secure your Azure Firewall deployments
3
-
description: You can use Azure Policy to help secure your Azure Firewall deployments.
3
+
description: Govern Azure Firewall configurations by applying Azure Policies that enforce security best practices and organizational compliance standards.
4
4
author: duau
5
5
ms.author: duau
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 09/05/2024
8
+
ms.date: 03/28/2026
9
9
# Customer intent: "As a network administrator, I want to apply Azure Policies to govern Azure Firewall configurations, so that I can ensure compliance with security best practices and organizational standards."
10
10
---
11
11
12
12
# Use Azure Policy to help secure your Azure Firewall deployments
13
13
14
-
Azure Policy is a service in Azure that allows you to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy does this by evaluating your resources for noncompliance with assigned policies. For example, you can have a policy to allow only a certain size of virtual machines in your environment or to enforce a specific tag on resources.
14
+
Azure Policy is a service in Azure that you can use to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy evaluates your resources for noncompliance with assigned policies. For example, you can use a policy to allow only a certain size of virtual machines in your environment or to enforce a specific tag on resources.
15
15
16
-
Azure Policy can be used to govern Azure Firewall configurations by applying policies that define what configurations are allowed or disallowed. This helps ensure that the firewall settings are consistent with organizational compliance requirements and security best practices.
16
+
You can use Azure Policy to govern Azure Firewall configurations by applying policies that define what configurations are allowed or disallowed. This approach helps ensure that the firewall settings are consistent with organizational compliance requirements and security best practices.
17
17
18
18
## Prerequisites
19
19
@@ -23,105 +23,64 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
23
23
24
24
The following policies are available for Azure Firewall:
25
25
26
-
-**Enable Threat Intelligence in Azure Firewall Policy**
27
-
28
-
This policy makes sure that any Azure Firewall configuration without threat intel enabled is marked as noncompliant.
29
-
-**Deploy Azure Firewall across Multiple Availability Zones**
30
-
31
-
The policy restricts Azure Firewall deployment to be only allowed with Multiple Availability Zone configuration.
32
-
-**Upgrade Azure Firewall Standard to Premium**
33
-
34
-
This policy recommends upgrading Azure Firewall Standard to Premium so that all the Premium version advanced firewall features can be used. This further enhances the security of the network.
35
-
-**Azure Firewall Policy Analytics should be enabled**
36
-
37
-
This policy ensures that the Policy Analytics is enabled on the firewall to effectively tune and optimize firewall rules.
38
-
-**Azure Firewall should only allow Encrypted Traffic**
39
-
40
-
This policy analyses existing rules and ports in Azure firewall policy and audits firewall policy to make sure that only encrypted traffic is allowed into the environment.
41
-
-**Azure Firewall should have DNS Proxy Enabled**
42
-
43
-
This Policy Ensures that DNS proxy feature is enabled on Azure Firewall deployments.
44
-
-**Enable IDPS in Azure Firewall Premium Policy**
45
-
46
-
This policy ensures that the IDPS feature is enabled on Azure Firewall deployments to effectively protect the environment from various threats and vulnerabilities.
47
-
-**Enable TLS inspection on Azure Firewall Policy**
48
-
49
-
This policy mandates that TLS inspection is enabled to detect, alert, and mitigate malicious activity in HTTPS traffic.
50
-
-**Enforce Explicit Proxy Configuration for Firewall Policies**
51
-
52
-
This policy ensures that all Azure Firewall policies have explicit proxy configuration enabled. It checks for the presence of the `explicitProxy.enableExplicitProxy` field and flags resources as noncompliant if this setting is missing. This helps maintain consistent proxy configurations across all firewall deployments. For the complete policy definition, see [Enforce Explicit Proxy Configuration for Firewall Policies](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Policy%20-%20Azure%20Policy%20Definitions/Policy%20-%20Enforce%20Explicit%20Proxy%20Configuration%20for%20Firewall%20Policies).
53
-
-**Enable PAC file configuration while using Explicit Proxy on Azure Firewall**
54
-
55
-
This policy audits Azure Firewall policies to ensure that when explicit proxy is enabled, the PAC (Proxy Auto-Configuration) file is also properly configured. It validates that if `explicitProxy.enableExplicitProxy` is true, then `explicitProxy.enablePacFile` should also be enabled to provide proper proxy auto-configuration capabilities. For the complete policy definition, see [Enable PAC file configuration while using Explicit Proxy on Azure Firewall](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Policy%20-%20Azure%20Policy%20Definitions/Policy%20-%20Enable%20PAC%20file%20configuration%20while%20using%20Explicit%20Proxy%20on%20Azure%20Firewall).
56
-
-**Migrate from Azure Firewall Classic Rules to Firewall Policy**
57
-
58
-
This policy recommends migrating from Firewall Classic Rules to Firewall Policy.
59
-
-**VNET with specific tag must have Azure Firewall Deployed**
60
-
61
-
This policy finds all virtual networks with a specified tag and checks if there's an Azure Firewall deployed, and flags it as noncompliant if no Azure Firewall exists.
62
-
63
-
The following steps show how you can create an Azure Policy that enforces all Firewall Policies to have the Threat Intelligence feature enabled (either **Alert Only**, or **Alert and deny**). The Azure Policy scope is set to the resource group that you create.
26
+
| Policy | Description |
27
+
|--------|-------------|
28
+
|**Enable Threat Intelligence in Azure Firewall Policy**| Marks any Azure Firewall configuration without threat intelligence enabled as noncompliant. |
29
+
|**Deploy Azure Firewall across Multiple Availability Zones**| Restricts Azure Firewall deployment to only allow multiple Availability Zone configurations. |
30
+
|**Upgrade Azure Firewall Standard to Premium**| Recommends upgrading Azure Firewall Standard to Premium to use advanced Premium features and enhance network security. |
31
+
|**Azure Firewall Policy Analytics should be enabled**| Ensures Policy Analytics is enabled on the firewall to effectively tune and optimize firewall rules. |
32
+
|**Azure Firewall should only allow Encrypted Traffic**| Audits firewall policy rules and ports to ensure only encrypted traffic is allowed into the environment. |
33
+
|**Azure Firewall should have DNS Proxy Enabled**| Ensures the DNS proxy feature is enabled on Azure Firewall deployments. |
34
+
|**Enable IDPS in Azure Firewall Premium Policy**| Ensures the IDPS feature is enabled on Azure Firewall deployments to protect against threats and vulnerabilities. |
35
+
|**Enable TLS inspection on Azure Firewall Policy**| Requires TLS inspection to be enabled to detect, alert, and mitigate malicious activity in HTTPS traffic. |
36
+
|**Enforce Explicit Proxy Configuration for Firewall Policies**| Ensures all Azure Firewall policies have explicit proxy configuration enabled by checking for the `explicitProxy.enableExplicitProxy` field. For the complete policy definition, see [Enforce Explicit Proxy Configuration for Firewall Policies](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Policy%20-%20Azure%20Policy%20Definitions/Policy%20-%20Enforce%20Explicit%20Proxy%20Configuration%20for%20Firewall%20Policies). |
37
+
|**Enable PAC file configuration while using Explicit Proxy on Azure Firewall**| Audits firewall policies to ensure that when explicit proxy is enabled (`explicitProxy.enableExplicitProxy` is true), the PAC file (`explicitProxy.enablePacFile`) is also enabled. For the complete policy definition, see [Enable PAC file configuration while using Explicit Proxy on Azure Firewall](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Policy%20-%20Azure%20Policy%20Definitions/Policy%20-%20Enable%20PAC%20file%20configuration%20while%20using%20Explicit%20Proxy%20on%20Azure%20Firewall). |
38
+
|**Migrate from Azure Firewall Classic Rules to Firewall Policy**| Recommends migrating from Firewall Classic Rules to Firewall Policy. |
39
+
|**VNET with specific tag must have Azure Firewall Deployed**| Checks all virtual networks with a specified tag for an Azure Firewall deployment and flags the configuration as noncompliant if none exists. |
40
+
41
+
The following steps show how you can create an Azure Policy that enforces all Firewall Policies to have the Threat Intelligence feature enabled (either **Alert Only** or **Alert and deny**). Set the Azure Policy scope to the resource group that you create.
64
42
65
43
## Create a resource group
66
44
67
-
This resource group is set as the scope for the Azure Policy, and is where you create the Firewall Policy.
45
+
Set this resource group as the scope for the Azure Policy. Create the Firewall Policy in this resource group.
68
46
69
-
1. From the Azure portal, select **Create a resource**.
70
-
1. In the search box, type **resource group** and press Enter.
71
-
1. Select **Resource group** from the search results.
72
-
1. Select **Create**.
73
-
1. Select your subscription.
74
-
1. Type a name for your resource group.
75
-
1. Select a region.
76
-
1. Select **Next : Tags**.
77
-
1. Select **Next : Review + create**.
78
-
1. Select **Create**.
47
+
1. From the Azure portal, select **Create a resource**, search for `resource group`, and select **Resource group** from the results.
48
+
1. Select **Create**, select your subscription, type a name for your resource group, and select a region.
49
+
1. Select **Review + create**, and then select **Create**.
79
50
80
51
## Create an Azure Policy
81
52
82
-
Now create an Azure Policy in your new resource group. This policy ensures that any firewall policies must have Threat Intelligence enabled.
53
+
Now create an Azure Policy in your new resource group. This policy ensures that any firewall policies have Threat Intelligence enabled.
83
54
84
-
1. From the Azure portal, select **All services**.
85
-
1. In the filter box, type **policy** and press Enter.
86
-
1. Select **Policy** in the search results.
87
-
1. On the Policy page, select **Getting started**.
88
-
1. Under **Assign policies**, select **View definitions**.
89
-
1. On the Definitions page, type **firewall**, in the search box.
90
-
1. Select **Azure Firewall Policy should enable Threat Intelligence**.
55
+
1. From the Azure portal, search for `policy`, and select **Policy** from the results.
56
+
1. In the left menu, expand **Authoring** and select **Definitions**.
57
+
1. In the search box, type `firewall`, and then select **Azure Firewall Policy should enable Threat Intelligence**.
91
58
1. Select **Assign policy**.
92
-
1. For **Scope**, select you subscription and your new resource group.
93
-
1. Select **Select**.
59
+
1. For **Scope**, select your subscription and your new resource group, and then select **Select**.
94
60
1. Select **Next**.
95
-
1. On the **Parameters** page, clear the **Only show parameters that need input or review** check box.
96
-
1. For **Effect**, select **Deny**.
97
-
1. Select **Review + create**.
98
-
1. Select **Create**.
61
+
1. On the **Parameters** pane, clear the **Only show parameters that need input or review** check box, and then for **Effect**, select **Deny**.
62
+
1. Select **Review + create**, then select **Create**.
99
63
100
-
## Create a Firewall Policy
64
+
## Create a firewall policy
101
65
102
-
Now you attempt to create a Firewall Policy with Threat Intelligence disabled.
66
+
Now, create a firewall policy with Threat Intelligence disabled.
103
67
104
-
1. From the Azure portal, select **Create a resource**.
105
-
1. In the search box, type **firewall policy** and press Enter.
106
-
1. Select **Firewall Policy** in the search results.
107
-
1. Select **Create**.
108
-
1. Select your subscription.
109
-
1. For **Resource group**, select the resource group that you created previously.
110
-
1. In the **Name** text box, type a name for your policy.
111
-
1. Select **Next : DNS Settings**.
112
-
1. Continue selecting through to the **Threat intelligence** page.
68
+
1. From the Azure portal, select **Create a resource**, search for `firewall policy`, and select **Firewall Policy** from the results.
69
+
1. Select **Create**, and then select your subscription and the resource group that you created previously.
70
+
1. In the **Name** box, type a name for your policy.
71
+
1. Go to the **Threat intelligence** tab.
113
72
1. For **Threat intelligence mode**, select **Disabled**.
114
73
1. Select **Review + create**.
115
74
116
-
You should see an error that says your resource was disallowed by policy, confirming that your Azure Policy doesn't allow firewall policies that have Threat Intelligence disabled.
75
+
You see an error that says your resource was disallowed by policy, confirming that your Azure Policy doesn't allow firewall policies that have Threat Intelligence disabled.
117
76
118
77
## Additional Azure Policy definitions
119
78
120
79
For more Azure Policy definitions specifically designed for Azure Firewall, including policies for explicit proxy configuration, see the [Azure Network Security GitHub repository](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Policy%20-%20Azure%20Policy%20Definitions). This repository contains community-contributed policy definitions that you can deploy in your environment.
121
80
122
81
## Related content
123
82
124
-
-[What is Azure Policy?](../governance/policy/overview.md)
-[Govern your Azure Firewall configuration with Azure Policies](https://techcommunity.microsoft.com/t5/azure-network-security-blog/govern-your-azure-firewall-configuration-with-azure-policies/ba-p/4189902)
0 commit comments