Skip to content

Commit 3e1b4b6

Browse files
Merge pull request #313846 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-29 11:00 UTC
2 parents 5f031ed + d98dc9d commit 3e1b4b6

28 files changed

Lines changed: 708 additions & 787 deletions

articles/firewall/compliance-certifications.md

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,39 @@
11
---
22
title: Azure Firewall certifications
3-
description: A list of Azure Firewall certifications for PCI, SOC, and ISO.
4-
services: firewall
3+
description: Learn about Azure Firewall compliance certifications including CSA STAR, ISO, SOC, PCI DSS, HITRUST, FedRAMP, and DoD across global and industry-specific audit programs.
54
author: duongau
65
ms.service: azure-firewall
76
ms.topic: concept-article
8-
ms.date: 04/28/2023
7+
ms.date: 03/28/2026
98
ms.author: duau
109
# Customer intent: "As a compliance officer in a regulated industry, I want to review the certifications of Azure Firewall, so that I can ensure it meets the necessary regulatory requirements for our organization."
1110
---
1211

1312
# Azure Firewall certifications
1413

15-
To help you meet your own compliance obligations across regulated industries and markets worldwide, Azure maintains the largest compliance portfolio in the industry both in terms of breadth (total number of offerings) and depth (number of [customer-facing services](https://azure.microsoft.com/services/) in assessment scope).
14+
To help you meet your own compliance obligations across regulated industries and markets worldwide, Azure maintains the largest compliance portfolio in the industry both in terms of breadth (total number of offerings) and depth (number of [customer-facing services](https://azure.microsoft.com/services/) in assessment scope).
1615
For service availability, see [Products available by region](https://azure.microsoft.com/global-infrastructure/services/).
1716

1817
## Azure Firewall audit scope
1918

20-
Microsoft retains independent, third-party auditing firms to conduct audits of Microsoft cloud services. The resulting compliance assurances are applicable to both Azure and Azure Government cloud environments. Compliance offerings are grouped into four segments: globally applicable, US government, industry specific, and region/country specific. Azure compliance certificates and audit reports state clearly which cloud services are in scope for independent third-party audits. Different audits may have different cloud services in audit scope.
19+
Microsoft retains independent, third-party auditing firms to conduct audits of Microsoft cloud services. The resulting compliance assurances apply to both Azure and Azure Government cloud environments. Compliance offerings are grouped into four segments: globally applicable, US government, industry specific, and region or country/region specific. Azure compliance certificates and audit reports clearly state which cloud services are in scope for independent third-party audits. Different audits might have different cloud services in audit scope.
2120

22-
Azure Firewall is included in many Azure compliance audits such as CSA STAR, ISO, SOC, PCI DSS, HITRUST, FedRAMP, DoD, and others. For the latest insight into Azure Firewall compliance audit scope, see [Cloud services in audit scope](/azure/compliance/offerings/cloud-services-in-audit-scope).
21+
Azure Firewall is included in many Azure compliance audits. The following list shows the key certifications by category:
22+
23+
**Global, industry, and regional:**
24+
- CSA STAR
25+
- ISO/IEC 27001, 27017, and 27018
26+
- SOC 1 Type 2, SOC 2 Type 2, and SOC 3
27+
- PCI DSS Level 1
28+
- HIPAA BAA
29+
- HITRUST CSF
30+
- GSMA
31+
32+
**US government:**
33+
- FedRAMP High
34+
- DoD IL2, IL4, IL5, and IL6 (Azure Government)
35+
36+
For the authoritative and up-to-date list of which Azure services are in each audit scope, see [Cloud services in audit scope](/azure/compliance/offerings/cloud-services-in-audit-scope).
2337

2438
## Next steps
2539

articles/firewall/detect-malware-with-sentinel.md

Lines changed: 83 additions & 95 deletions
Large diffs are not rendered by default.

articles/firewall/dns-details.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,11 @@
11
---
22
title: Azure Firewall DNS Proxy details
3-
description: Learn how Azure Firewall DNS Proxy works
4-
services: firewall
3+
description: Learn about Azure Firewall DNS proxy implementation details, including FQDN caching behavior, TTL handling, and how DNS proxy affects network rule filtering.
54
author: duongau
5+
ms.author: duau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 06/11/2024
9-
ms.author: duau
8+
ms.date: 03/28/2026
109
# Customer intent: As a network administrator, I want to configure Azure Firewall as a DNS proxy, so that I can ensure consistent and reliable DNS resolution for client virtual machines in my network.
1110
---
1211

@@ -20,19 +19,19 @@ The following information describes some implementation details for Azure Firewa
2019

2120
Azure Firewall acts as a standard DNS client. If multiple A records are in the response, the firewall stores all the records in cache and offers them to the client in the response. If there’s one record per response, the firewall stores only a single record. There's no way for a client to know ahead of time if it should expect one or multiple A records in responses.
2221

23-
## FQDN Time to Live (TTL)
22+
## FQDN time to live (TTL)
2423

25-
When a FQDN TTL (time-to-live) is about to expire, records are cached and expired according to their TTLs. Pre-fetching isn't used, so the firewall doesn't do a lookup before TTL expiration to refresh the record.
24+
The firewall caches and expires records according to their TTLs. Because the firewall doesn't use prefetching, it doesn't do a lookup before TTL expiration to refresh the record.
2625

2726
## Clients not configured to use the firewall DNS proxy
2827

29-
If a client computer is configured to use a DNS server that isn't the firewall DNS proxy, the results can be unpredictable.
28+
If you configure a client computer to use a DNS server that isn't the firewall DNS proxy, the results can be unpredictable.
3029

31-
For example, assume a client workload is in US East, and uses a primary DNS server hosted in US East. Azure Firewall DNS server settings are configured for a secondary DNS server hosted in US West. The firewalls DNS server hosted in US West results in a response different than that of the client in US East.
30+
For example, assume a client workload is in US East, and uses a primary DNS server hosted in US East. Azure Firewall DNS server settings are configured for a secondary DNS server hosted in US West. The firewall's DNS server hosted in US West results in a response different from that of the client in US East.
3231

33-
This is a common scenario, and why clients should use the firewalls DNS proxy functionality. Clients should use the firewall as their resolver if you use FQDNs in Network rules. You can ensure IP address resolution consistency by clients and the firewall itself.
32+
This scenario is common, and why clients should use the firewall's DNS proxy functionality. Clients should use the firewall as their resolver if you use FQDNs in Network rules. You can ensure IP address resolution consistency by clients and the firewall itself.
3433

35-
In this example, if an FQDN is configured in Network rules, the firewall resolves the FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and when the client resolves the same FQDN to IP2 because of a difference in DNS response, its connection attempt won't match the rules on the firewall and is denied.
34+
In this example, if an FQDN is configured in Network rules, the firewall resolves the FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and when the client resolves the same FQDN to IP2 because of a difference in DNS response, its connection attempt doesn't match the rules on the firewall and is denied.
3635

3736
For HTTP/S FQDNs in Application rules, the firewall parses out the FQDN from the host or SNI header, resolves it, and then connects to that IP address. The destination IP address the client was trying to connect to is ignored.
3837

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,53 +1,52 @@
11
---
2-
title: Azure Firewall Explicit proxy (preview)
3-
description: Learn about Azure Firewall's Explicit Proxy setting.
4-
services: firewall
5-
author: duau
2+
title: Azure Firewall explicit proxy (preview)
3+
description: Learn about Azure Firewall's explicit proxy setting.
4+
author: duongau
65
ms.service: azure-firewall
76
ms.topic: concept-article
8-
ms.date: 03/30/2023
9-
ms.author: magakman
7+
ms.date: 03/28/2026
8+
ms.author: duau
109
ms.custom: sfi-image-nochange
1110
# Customer intent: As a network administrator, I want to configure an explicit proxy on Azure Firewall, so that I can manage outbound traffic efficiently without using a user-defined route.
1211
---
1312

14-
# Azure Firewall Explicit proxy (preview)
13+
# Azure Firewall explicit proxy (preview)
1514

1615
> [!IMPORTANT]
1716
> Explicit proxy is currently in PREVIEW.
1817
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1918
20-
Azure Firewall operates in a transparent proxy mode by default. In this mode, traffic is sent to the firewall using a user defined route (UDR) configuration. The firewall intercepts that traffic inline and passes it to the destination.
19+
Azure Firewall operates in a transparent proxy mode by default. In this mode, you use a user-defined route (UDR) configuration to send traffic to the firewall. The firewall intercepts that traffic inline and passes it to the destination.
2120

22-
With Explicit proxy set on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without the using a UDR.
21+
When you set up explicit proxy on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without using a UDR.
2322

24-
With the Explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
23+
With the explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
2524

2625
## Configuration
2726

28-
- Once the feature is enabled, the following screen shows on the portal:
27+
- After you enable the feature, the following screen appears on the portal:
2928

3029
:::image type="content" source="media/explicit-proxy/enable-explicit-proxy.png" alt-text="Screenshot showing the Enable explicit proxy setting.":::
3130

3231
> [!NOTE]
3332
> The HTTP and HTTPS ports can't be the same.
3433
35-
- Next, to allow the traffic to pass through the Firewall, create an **application** rule in the Firewall policy to allow this traffic.
36-
> [!IMPORTANT]
37-
> You must use an application rule. A network rule won't work.
34+
1. Next, to allow the traffic through the firewall, create an **application** rule in the firewall policy to allow this traffic.
3835

36+
> [!IMPORTANT]
37+
> You must use an application rule. A network rule doesn't work.
3938
40-
- To use the Proxy autoconfiguration (PAC) file, select **Enable proxy auto-configuration**.
39+
- Select **Enable proxy auto-configuration** to use the Proxy autoconfiguration (PAC) file.
4140

42-
- First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy** page, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
41+
1. First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy** pane, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
4342

44-
The SAS URL must have READ permissions so the firewall can download the file. If changes are made to the PAC file, a new SAS URL needs to be generated and configured on the firewall **Enable explicit proxy** page.
43+
The SAS URL must have **READ** permissions so the firewall can download the file. If you make changes to the PAC file, you need to generate a new SAS URL and configure it on the firewall **Enable explicit proxy** page.
4544

4645
:::image type="content" source="media/explicit-proxy/shared-access-signature.png" alt-text="Screenshot showing generate shared access signature.":::
4746

4847
## Governance and compliance
4948

50-
To ensure consistent configuration of explicit proxy settings across your Azure Firewall deployments, you can use Azure Policy definitions. The following policies are available to govern explicit proxy configurations:
49+
To ensure consistent configuration of explicit proxy settings across your Azure Firewall deployments, use Azure Policy definitions. The following policies are available to govern explicit proxy configurations:
5150

5251
- **Enforce Explicit Proxy Configuration for Firewall Policies**: Ensures that all Azure Firewall policies have explicit proxy configuration enabled.
5352
- **Enable PAC file configuration while using Explicit Proxy**: Audits that when explicit proxy is enabled, the PAC (Proxy Auto-Configuration) file is also properly configured.
@@ -56,5 +55,5 @@ For more information about these policies and how to implement them, see [Use Az
5655

5756
## Next steps
5857

59-
- To learn more about Explicit proxy, see [Demystifying Explicit proxy: Enhancing Security with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/demystifying-explicit-proxy-enhancing-security-with-azure/ba-p/3873445).
60-
- To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall using Azure PowerShell](deploy-ps.md).
58+
- To learn more about explicit proxy, see [Demystifying Explicit proxy: Enhancing Security with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/demystifying-explicit-proxy-enhancing-security-with-azure/ba-p/3873445).
59+
- To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall by using Azure PowerShell](deploy-ps.md).

0 commit comments

Comments
 (0)