Skip to content

Commit 418664f

Browse files
committed
docs: fix metadata, stale language, product names, style edits
1 parent 251f09f commit 418664f

1 file changed

Lines changed: 28 additions & 31 deletions

File tree

Lines changed: 28 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
---
22
title: Azure Firewall with Microsoft Sentinel overview
3-
description: This article shows you how you can optimize security using the Azure Firewall solution for Microsoft Sentinel.
3+
description: Learn how to integrate Azure Firewall with Microsoft Sentinel to detect threats, visualize firewall activity, and automate incident response.
44
author: duongau
55
ms.author: duau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 10/09/2023
8+
ms.date: 03/28/2026
99
# Customer intent: As a security operations analyst, I want to integrate Azure Firewall with my security monitoring solution, so that I can enhance threat detection and automate incident response to safeguard my organization's network against sophisticated cyber attacks.
1010
---
1111

1212
# Azure Firewall with Microsoft Sentinel overview
1313

14-
You can now get both detection and prevention in the form of an easy-to-deploy Azure Firewall solution for Azure Sentinel.
14+
You get both detection and prevention in an easy-to-deploy Azure Firewall solution for Microsoft Sentinel.
1515

1616
Security is a constant balance between proactive and reactive defenses. They're both equally important, and neither can be neglected. Effectively protecting your organization means constantly optimizing both prevention and detection.
1717

18-
Combining prevention and detection allows you to ensure that you both prevent sophisticated threats when you can, while also maintaining an *assume breach mentality* to detect and quickly respond to cyber attacks.
18+
By combining prevention and detection, you can prevent sophisticated threats when you can, while also maintaining an *assume breach mentality* to detect and quickly respond to cyberattacks.
1919

2020

2121
## Prerequisites
@@ -26,81 +26,78 @@ Combining prevention and detection allows you to ensure that you both prevent so
2626

2727
When you integrate Azure Firewall with Microsoft Sentinel, you enable the following capabilities:
2828

29-
- Monitor and visualize Azure Firewall activities
30-
- Detect threats and apply AI-assisted investigation capabilities
31-
- Automate responses and correlation to other sources
29+
- Monitor and visualize Azure Firewall activities.
30+
- Detect threats and apply AI-assisted investigation capabilities.
31+
- Automate responses and correlation to other sources.
3232

33-
The entire experience is packaged as a solution in the Microsoft Sentinel marketplace, which means it can be deployed relatively easily.
33+
The entire experience is packaged as a solution in the Microsoft Sentinel marketplace, which means you can deploy it relatively easily.
3434

3535
## Deploy and enable the Azure Firewall solution for Microsoft Sentinel
3636

37-
You can quickly deploy the solution from the Content hub. From your Microsoft Sentinel workspace, select **Analytics** and then **More content at Content hub**. Search for and select **Azure Firewall** and then select **Install**.
37+
You can quickly deploy the solution from the Content hub. From your Microsoft Sentinel workspace, select **Analytics** and then **More content at Content hub**. Search for and select **Azure Firewall** and then select **Install**.
3838

39-
Once installed, select **Manage** follow all the steps in the wizard, pass validation, and create the solution. With just a few selections, all content, including connectors, detections, workbooks, and playbooks are deployed in your Microsoft Sentinel workspace.
39+
After installation, select **Manage** and follow all the steps in the wizard, pass validation, and create the solution. With a few selections, all content, including connectors, detections, workbooks, and playbooks are deployed in your Microsoft Sentinel workspace.
4040

4141
## Monitor and visualize Azure Firewall activities
4242

43-
The Azure Firewall workbook allows you to visualize Azure Firewall events. With this workbook, you can:
43+
The Azure Firewall workbook allows you to visualize Azure Firewall events. By using this workbook, you can:
4444

45-
- Learn about your application and network rules
46-
- See statistics for firewall activities across URLs, ports, and addresses
47-
- Filter by firewall and resource group
45+
- Learn about your application and network rules.
46+
- See statistics for firewall activities across URLs, ports, and addresses.
47+
- Filter by firewall and resource group.
4848
- Dynamically filter per category with easy-to-read data sets when investigating an issue in the logs.
4949

5050
The workbook provides a single dashboard for ongoing monitoring of your firewall activity. When it comes to threat detection, investigation, and response, the Azure Firewall solution also provides built-in detection and hunting capabilities.
5151

5252
## Detect threats and use AI-assisted investigation capabilities
5353

54-
The solutions detection rules provide Microsoft Sentinel a powerful method for analyzing Azure Firewall signals to detect traffic representing malicious activity patterns traversing through the network. This allows rapid response and remediation of the threats.
54+
The solution's detection rules give Microsoft Sentinel a robust way to analyze Azure Firewall signals and detect traffic that shows malicious activity patterns moving through the network. This approach enables quick response and remediation of threats.
5555

56-
The attack stages an adversary pursues within the firewall solution are segmented based on the [MITRE ATT&CK](https://attack.mitre.org/) framework. The MITRE framework is a series of steps that trace stages of a cyber attack from the early reconnaissance stages to the exfiltration of data. The framework helps defenders understand and combat ransomware, security breaches, and advanced attacks.
56+
The detection rules segment the attack stages that an adversary pursues within the firewall solution, based on the [MITRE ATT&CK](https://attack.mitre.org/) framework. The MITRE framework is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The framework helps defenders understand and combat ransomware, security breaches, and advanced attacks.
5757

58-
The solution includes detections for common scenarios an adversary might use as part of the attack, spanning from the discovery stage (gaining knowledge about the system and internal network) through the command-and-control (C2) stage (communicating with compromised systems to control them) to the exfiltration stage (adversary trying to steal data from the organization).
58+
The solution includes detections for common scenarios that an adversary might use as part of the attack, spanning from the discovery stage (gaining knowledge about the system and internal network) through the command-and-control (C2) stage (communicating with compromised systems to control them) to the exfiltration stage (adversary trying to steal data from the organization).
5959

6060
| Detection rule | What does it do? | What does it indicate? |
6161
| --- | --- | --- |
6262
| Port scan | Identifies a source IP scanning multiple open ports on the Azure Firewall. | Malicious scanning of ports by an attacker, trying to reveal open ports in the organization that can be compromised for initial access. |
6363
| Port sweep | Identifies a source IP scanning the same open ports on the Azure Firewall different IPs. | Malicious scanning of a port by an attacker trying to reveal IPs with specific vulnerable ports open in the organization. |
64-
| Abnormal deny rate for source IP | Identifies an abnormal deny rate for a specific source IP to a destination IP based on machine learning done during a configured period. | Potential exfiltration, initial access, or C2, where an attacker tries to exploit the same vulnerability on machines in the organization but Azure Firewall rules blocks it. |
64+
| Abnormal deny rate for source IP | Identifies an abnormal deny rate for a specific source IP to a destination IP based on machine learning done during a configured period. | Potential exfiltration, initial access, or C2, where an attacker tries to exploit the same vulnerability on machines in the organization but Azure Firewall rules block it. |
6565
| Abnormal Port to protocol | Identifies communication for a well-known protocol over a nonstandard port based on machine learning done during an activity period. | Malicious communication (C2) or exfiltration by attackers trying to communicate over known ports (SSH, HTTP) but don’t use the known protocol headers that match the port number. |
6666
| Multiple sources affected by the same TI destination | Identifies multiple machines that are trying to reach out to the same destination blocked by threat intelligence (TI) in the Azure Firewall. | An attack on the organization by the same attack group trying to exfiltrate data from the organization. |
6767

6868
### Hunting queries
6969

70-
Hunting queries are a tool for the security researcher to look for threats in the network of an organization, either after an incident has occurred or proactively to discover new or unknown attacks. To do this, security researchers look at several indicators of compromise (IOCs). The built-in Azure Sentinel hunting queries in the Azure Firewall solution give security researchers the tools they need to find high-impact activities from the firewall logs. Several examples include:
70+
Hunting queries are a tool for the security researcher to look for threats in the network of an organization, either after an incident occurs or proactively to discover new or unknown attacks. To do this, security researchers look at several indicators of compromise (IOCs). The built-in Microsoft Sentinel hunting queries in the Azure Firewall solution give security researchers the tools they need to find high-impact activities from the firewall logs. Several examples include:
7171

7272
| Hunting query | What does it do? | What does it indicate? |
7373
| --- | --- | --- |
7474
| First time a source IP connects to destination port | Helps to identify a common indication of an attack (IOA) when a new host or IP tries to communicate with a destination using a specific port. | Based on learning the regular traffic during a specified period. |
7575
| First time source IP connects to a destination | Helps to identify an IOA when malicious communication is done for the first time from machines that never accessed the destination before. | Based on learning the regular traffic during a specified period. |
7676
| Source IP abnormally connects to multiple destinations | Identifies a source IP that abnormally connects to multiple destinations. | Indicates initial access attempts by attackers trying to jump between different machines in the organization, exploiting lateral movement path or the same vulnerability on different machines to find vulnerable machines to access. |
77-
| Uncommon port for the organization | Identifies abnormal ports used in the organization network. | An attacker can bypass monitored ports and send data through uncommon ports. This allows the attackers to evade detection from routine detection systems. |
78-
| Uncommon port connection to destination IP | Identifies abnormal ports used by machines to connect to a destination IP. | An attacker can bypass monitored ports and send data through uncommon ports. This can also indicate an exfiltration attack from machines in the organization by using a port that has never been used on the machine for communication. |
77+
| Uncommon port for the organization | Identifies abnormal ports used in the organization network. | An attacker can bypass monitored ports and send data through uncommon ports. This action allows the attackers to evade detection from routine detection systems. |
78+
| Uncommon port connection to destination IP | Identifies abnormal ports used by machines to connect to a destination IP. | An attacker can bypass monitored ports and send data through uncommon ports. This action can also indicate an exfiltration attack from machines in the organization by using a port that is never used on the machine for communication. |
7979

8080
### Automate response and correlation to other sources
8181

82-
Lastly, the Azure Firewall also includes Azure Sentinel playbooks, which enable you to automate response to threats. For example, say the firewall logs an event where a particular device on the network tries to communicate with the Internet via the HTTP protocol over a nonstandard TCP port. This action triggers a detection in Azure Sentinel. The playbook automates a notification to the security operations team via Microsoft Teams, and the security analysts can block the source IP address of the device with a single selection. This prevents it from accessing the Internet until an investigation can be completed. Playbooks allow this process to be much more efficient and streamlined.
82+
Azure Firewall also includes Microsoft Sentinel playbooks, which you can use to automate response to threats. For example, suppose the firewall logs an event where a particular device on the network tries to communicate with the internet by using the HTTP protocol over a nonstandard TCP port. This action triggers a detection in Microsoft Sentinel. The playbook automates a notification to the security operations team through Microsoft Teams, and the security analysts can block the source IP address of the device with a single selection. This action prevents it from accessing the internet until an investigation can be completed. Playbooks make this process much more efficient and streamlined.
8383

8484
## Real world example
8585

86-
Let’s look at what the fully integrated solution looks like in a real-world scenario.
86+
Here's what the fully integrated solution looks like in a real-world scenario.
8787

8888
### The attack and initial prevention by Azure Firewall
8989

90-
A sales representative in the company has accidentally opened a phishing email and opened a PDF file containing malware. The malware immediately tries to connect to a malicious website but Azure Firewall blocks it. The firewall detected the domain using the Microsoft threat intelligence feed it consumes.
90+
A sales representative in the company accidentally opens a phishing email and opens a PDF file containing malware. The malware immediately tries to connect to a malicious website but Azure Firewall blocks it. The firewall detected the domain by using the Microsoft threat intelligence feed it consumes.
9191

9292
### The response
9393

94-
The connection attempt triggers a detection in Azure Sentinel and starts the playbook automation process to notify the security operations team via a Teams channel. There, the analyst can block the computer from communicating with the Internet. The security operations team then notifies the IT department which removes the malware from the sales representative’s computer. However, taking the proactive approach and looking deeper, the security researcher applies the Azure Firewall hunting queries and runs the **Source IP abnormally connects to multiple destinations** query. This reveals that the malware on the infected computer tried to communicate with several other devices on the broader network and tried to access several of them. One of those access attempts succeeded, as there was no proper network segmentation to prevent the lateral movement in the network, and the new device had a known vulnerability the malware exploited to infect it.
94+
The connection attempt triggers a detection in Microsoft Sentinel and starts the playbook automation process to notify the security operations team through a Teams channel. There, the analyst can block the computer from communicating with the Internet. The security operations team then notifies the IT department which removes the malware from the sales representative’s computer. However, taking the proactive approach and looking deeper, the security researcher applies the Azure Firewall hunting queries and runs the **Source IP abnormally connects to multiple destinations** query. This reveals that the malware on the infected computer tried to communicate with several other devices on the broader network and tried to access several of them. One of those access attempts succeeded, as there was no proper network segmentation to prevent the lateral movement in the network, and the new device had a known vulnerability the malware exploited to infect it.
9595

9696
### The result
9797

9898
The security researcher removed the malware from the new device, completed mitigating the attack, and discovered a network weakness in the process.
9999

100-
## Next step
100+
## Next steps
101101

102-
103-
> [!div class="nextstepaction"]
104-
> [Learn more about Microsoft Sentinel](../sentinel/overview.md)
105-
>
106-
> [Microsoft security](https://www.microsoft.com/en-us/security/business)
102+
- Learn more about [Microsoft Sentinel](../sentinel/overview.md).
103+
- [Microsoft security](https://www.microsoft.com/en-us/security/business).

0 commit comments

Comments
 (0)