Skip to content

Commit 5d46eca

Browse files
committed
docs: Add SKU prerequisite note for threat intelligence deny mode
1 parent d409713 commit 5d46eca

1 file changed

Lines changed: 3 additions & 0 deletions

File tree

  • articles/networking/security/includes

articles/networking/security/includes/25537.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ ms.custom: Network-Secure-Recommendation
1515
---
1616
Azure Firewall Threat Intelligence-based filtering alerts and denies traffic from and to known malicious IP addresses, fully qualified domain names (FQDNs), and URLs sourced from the Microsoft Threat Intelligence feed. When enabled, Azure Firewall evaluates traffic against threat intelligence rules before applying network address translation (NAT), network, or application rules. This check verifies that Threat Intelligence is enabled in "Alert and deny" mode in the Azure Firewall policy. Without this feature enabled, the environment remains exposed to known malicious IPs, domains, and URLs, creating risk of compromise or data exfiltration.
1717

18+
> [!NOTE]
19+
> "Alert and deny" mode requires Azure Firewall Standard or Premium. Azure Firewall Basic supports alert mode only. For a full feature comparison, see [Choose the right Azure Firewall SKU](/azure/firewall/choose-firewall-sku).
20+
1821
**Remediation action**
1922

2023
- [Azure Firewall threat intelligence configuration](/azure/firewall-manager/threat-intelligence-settings)

0 commit comments

Comments
 (0)