Skip to content

Commit 6d6dcfc

Browse files
Merge pull request #311796 from lootle1/FR30
Freshness Edit: Azure Native Integration services
2 parents 8d51cdc + 89d439f commit 6d6dcfc

3 files changed

Lines changed: 9 additions & 9 deletions

File tree

articles/partner-solutions/includes/subscribe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@ ms.date: 01/06/2025
55
ms.author: kkendrick
66
---
77

8-
You can subscribe to the service through the Azure Marketplace [online store](/marketplace/azure-marketplace-overview#azure-marketplace-online-store) or through the [Azure portal](/azure/azure-portal/azure-portal-overview). Search for it by name:
8+
You can subscribe to the service through the Azure Marketplace [online store](/marketplace/marketplace-overview#azure-marketplace-online-store) or through the [Azure portal](/azure/azure-portal/azure-portal-overview). Search for it by name:

articles/partner-solutions/palo-alto/application-gateway.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Cloud Next Generation Firewall (NGFW) for Azure deployment behind Azure Application Gateway
33
description: Learn how to secure web applications with Cloud NGFW for Azure by Palo Alto Networks.
44

5-
ms.topic: conceptual
6-
ms.date: 12/09/2024
5+
ms.topic: how-to
6+
ms.date: 02/13/2026
77

88
---
99
# Cloud NGFW for Azure deployment behind Azure Application Gateway
@@ -67,15 +67,15 @@ By default, the virtual network connection to the hub has the **Propagate Defaul
6767

6868
In some cases, disabling the default route propagation might not be desirable. An example is when other applications or workloads are hosted in the Application Gateway virtual network and require the inspection by Cloud NGFW for Azure. In this case, you can enable the default route propagation but add a 0.0.0.0/0 route to the Application Gateway subnet to override the default route received from the hub. An explicit route to the application virtual network is also required.
6969

70-
You can locate the next hop IP address of Cloud NGFW for Azure by viewing the effective routes of a workload in a spoke virtual network.
70+
You can locate the next hop IP address of Cloud NGFW for Azure by viewing the effective routes of a workload in a spoke virtual network.
7171

7272
## Security policy considerations
7373

7474
### Azure rulestacks
7575

7676
You can use Azure rulestacks to configure security rules and apply security profiles in the Azure portal or through the API. When you're implementing the preceding architecture, configure the security rules by using Palo Alto Networks App-ID, Advanced Threat Prevention, Advanced URL Filtering, DNS Security, and [Cloud-Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions).
7777

78-
For more information, see [Cloud NGFW Native Policy Management Using Rulestacks](https://docs.paloaltonetworks.com/cloud-ngfw/azure/cloud-ngfw-for-azure/native-policy-management).
78+
For more information, see [Cloud NGFW Native Policy Management Using Rulestacks](https://docs.paloaltonetworks.com/cloud-ngfw-azure/administration/protect-traffic-with-cloud-ngfw-for-azure/cloud-ngfw-for-azure-native-policy-management).
7979

8080
> [!NOTE]
8181
> Use of the X-Forwarded-For (XFF) HTTP header field to enforce security policy is currently not supported with Azure rulestacks.
@@ -94,7 +94,7 @@ You need to apply special considerations to zone-based policies to ensure that t
9494

9595
## Related content
9696

97-
- [Cloud NGFW for Azure](https://docs.paloaltonetworks.com/cloud-ngfw/azure/cloud-ngfw-for-azure) (documentation from Palo Alto Networks)
97+
- [Cloud NGFW for Azure](https://docs.paloaltonetworks.com/cloud-ngfw-azure/getting-started/introducing-cloud-ngfw-for-azure/cloud-ngfw-for-azure) (documentation from Palo Alto Networks)
9898
- [Zero-trust network for web applications with Azure Firewall and Application Gateway](/azure/architecture/example-scenario/gateway/application-gateway-before-azure-firewall)
9999
- [Firewall and Application Gateway for virtual networks](/azure/architecture/example-scenario/gateway/firewall-application-gateway)
100100
- [Configure Palo Alto Networks Cloud NGFW in Virtual WAN](/azure/virtual-wan/how-to-palo-alto-cloud-ngfw)

articles/partner-solutions/palo-alto/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What is Cloud NGFW by Palo Alto Networks?
33
description: Learn about using Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks from Azure Marketplace.
44
ms.topic: overview
5-
ms.date: 12/09/2024
5+
ms.date: 02/13/2026
66
---
77

88
# What is Cloud NGFW by Palo Alto Networks?
@@ -13,7 +13,7 @@ Microsoft and Palo Alto Networks developed this service and manage it together.
1313

1414
You can find Cloud Next-Generation Firewall by Palo Alto Networks in the [Azure portal](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/PaloAltoNetworks.Cloudngfw%2Ffirewalls) or get it on [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/paloaltonetworks.pan_swfw_cloud_ngfw?tab=Overview).
1515

16-
Palo Alto Networks is leading provider of cloud security, offering next-generation cybersecurity to thousands of customers globally, across all sectors. The integration of Cloud Next-Generation Firewall by Palo Alto for Azure delivers an integrated experience while empowering developers to protect their organizations on Azure.
16+
Palo Alto Networks is a leading provider of cloud security, offering next-generation cybersecurity to thousands of customers globally, across all sectors. The integration of Cloud Next-Generation Firewall by Palo Alto for Azure delivers an integrated experience, while empowering developers to protect their organizations on Azure.
1717

1818
The Palo Alto Networks offering in Azure Marketplace allows you to manage the Cloud Next-Generation Firewall by Palo Alto Networks resources in the Azure portal as an integrated service. It enables you to easily utilize Palo Alto Networks best-in-class network security capabilities on Azure, and you can manage it using either Palo Alto Networks Panorama policy management solution or directly from the Azure portal. Cloud Next-Generation Firewall by Palo Alto combines the scalability and reliability of Microsoft Azure with Palo Alto Networks deep expertise in network security.
1919

@@ -23,7 +23,7 @@ Here are the key capabilities provided by the Palo Alto integration:
2323

2424
- **Seamless onboarding** of Palo Alto software as an integrated service on Azure.
2525
- **Unified billing** of Palo Alto through Azure monthly billing.
26-
- **Single-Sign on to Palo Alto** - No separate sign-up needed from Palo Alto portal.
26+
- **Single-Sign on to Palo Alto** with no separate sign-up needed from Palo Alto portal.
2727
- **Manage VNET and VWAN traffic** to use existing configuration (.conf) files for Palo Alto deployment.
2828

2929
## Subscribe to Cloud Next-Generation Firewall by Palo Alto Networks

0 commit comments

Comments
 (0)