You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Azure Firewall Workbooks provide a flexible canvas for Azure Firewall data analysis and the creation of rich visual reports within the Azure portal.
4
-
services: firewall
5
4
author: gopimsft
5
+
ms.author: duau
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 12/06/2023
9
-
ms.author: duau
8
+
ms.date: 03/28/2026
10
9
ms.custom: sfi-image-nochange
11
10
# Customer intent: As a network administrator, I want to analyze and visualize Azure Firewall data using workbooks, so that I can gain insights into firewall events and enhance security monitoring across multiple firewalls in the Azure environment.
12
11
---
13
12
14
-
# Using Azure Firewall Workbooks
13
+
# Use Azure Firewall workbooks
15
14
16
-
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You can use it to create rich visual reports within the Azure portal. You can tap into multiple Firewalls deployed across Azure, and combine them into unified interactive experiences.
15
+
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. Use it to create rich visual reports within the Azure portal. You can tap into multiple Firewalls deployed across Azure, and combine them into unified interactive experiences.
17
16
18
-
You can gain insights into Azure Firewall events, learn about your application and network rules, and see statistics for firewall activities across URLs, ports, and addresses. Azure Firewall Workbook allows you to filter your firewalls and resource groups, and dynamically filter per category with easy to read data sets when investigating an issue in your logs.
17
+
You can gain insights into Azure Firewall events, learn about your application and network rules, and see statistics for firewall activities across URLs, ports, and addresses. Azure Firewall Workbook allows you to filter your firewalls and resource groups, and dynamically filter per category with easy-to-read data sets when investigating an issue in your logs.
19
18
20
19
## Prerequisites
21
20
22
-
Before you start, enable [Azure Structured Firewall Logs](firewall-structured-logs.md) through the Azure portal.
21
+
Before you start, enable [Azure Structured Firewall Logs](monitor-firewall.md) through the Azure portal.
23
22
24
23
> [!IMPORTANT]
25
24
> All the following sections are valid for Firewall structured logs only.
26
-
>
25
+
>
27
26
28
-
If you want to use legacy logs, you can enable [diagnostic logging](firewall-diagnostics.md#enable-diagnostic-logging-through-the-azure-portal)using the Azure portal. Then go to [GitHub Workbook for Azure Firewall](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Workbook%20-%20Azure%20Firewall%20Monitor%20Workbook) and follow the instructions on the page.
27
+
If you want to use legacy logs, you can enable [diagnostic logging](monitor-firewall.md) by using the Azure portal. Then go to [GitHub Workbook for Azure Firewall](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Workbook%20-%20Azure%20Firewall%20Monitor%20Workbook) and follow the instructions on the page.
29
28
30
29
31
-
Also, read [Azure Firewall logs and metrics](logs-and-metrics.md) for an overview of the diagnostics logs and metrics available for Azure Firewall.
30
+
Also, read [Azure Firewall logs and metrics](monitor-firewall.md) for an overview of the diagnostics logs and metrics available for Azure Firewall.
32
31
33
32
## Get started
34
33
35
-
Once you've set up Firewall structured logs, you're all set to use the Azure Firewall embedded workbooks using the following steps:
34
+
After you set up Firewall structured logs, use the Azure Firewall embedded workbooks by following these steps:
36
35
37
-
1. In the portal, navigate to your Azure Firewall resource.
36
+
1. In the portal, go to your Azure Firewall resource.
38
37
2. Under **Monitoring**, select **Workbooks**.
39
-
3. In the Gallery, you can create new workbooks or use the existing Azure Firewall workbook as shown here:
38
+
3. In the gallery, you can create new workbooks or use the existing Azure Firewall workbook as shown in the following image:
40
39
41
40
:::image type="content" source="media/firewall-workbook/firewall-workbook-gallery.png" alt-text="Screenshot showing the firewall workbook gallery." lightbox="media/firewall-workbook/firewall-workbook-gallery.png":::
42
-
4. Select the log analytics workspace and one or more firewall names you want to use in this workbook as shown here:
41
+
4. Select the Log Analytics workspace and one or more firewall names you want to use in this workbook as shown in the following image:
:::image type="content" source="media/firewall-workbook/structured-logs.png" alt-text="Screenshot showing workspace and Azure Firewall selections in the workbook." lightbox="media/firewall-workbook/structured-logs.png" :::
45
44
46
45
## Workbook sections
47
46
48
47
The Azure Firewall workbook has seven tabs, each addressing distinct aspects of the service. The following sections describe each tab.
49
48
50
49
### Overview
51
50
52
-
The overview tab showcases graphs and statistics related to all types of firewall events aggregated from various logging categories. This includes network rules, application rules, DNS, Intrusion Detection and Prevention System (IDPS), Threat Intelligence, and more. The available widgets in Overview tab include:
51
+
The overview tab shows graphs and statistics related to all types of firewall events aggregated from various logging categories. This aggregation includes network rules, application rules, DNS, Intrusion Detection and Prevention System (IDPS), Threat Intelligence, and more. The available widgets in the Overview tab include:
53
52
54
53
-**Events, by time**: Displays event frequency over time.
55
54
-**Events, by firewall over time**: Shows event distribution across firewalls over time.
@@ -60,17 +59,17 @@ The overview tab showcases graphs and statistics related to all types of firewal
60
59
-**Network Rule Hit count (SUM)**: Counts network rule triggers.
61
60
-**Application Rule Hit count (SUM)**: Counts application rule triggers.
The Application rules tab shows Layer 7 related events statistics correlated with your specific application rules in Azure Firewall policy. The following widgets are available in the Application rules tab:
66
+
The **Application rules** tab shows Layer 7 related events statistics correlated with your specific application rules in Azure Firewall policy. The following widgets are available in the **Application rules** tab:
68
67
69
68
-**Application Rule Usage**: Shows usage of application rules.
-**Allowed FQDN's overtime**: Displays allowed FQDNs over time.
73
-
-**Allowed FQDN's by count**: Counts allowed FQDNs.
69
+
-**Denied FQDNs over time**: Displays denied Fully Qualified Domain Names (FQDNs) over time.
70
+
-**Denied FQDNs by count**: Counts denied FQDNs.
71
+
-**Allowed FQDNs over time**: Displays allowed FQDNs over time.
72
+
-**Allowed FQDNs by count**: Counts allowed FQDNs.
74
73
-**Allowed Web Categories overtime**: Shows allowed web categories over time.
75
74
-**Allowed Web Categories by count**: Counts allowed web categories.
76
75
-**Denied Web Categories overtime**: Displays denied web categories over time.
@@ -80,15 +79,15 @@ The Application rules tab shows Layer 7 related events statistics correlated wit
80
79
81
80
## Network rules
82
81
83
-
The Network rules tab shows Layer 4 related events statistics correlated with your specific network rules in Azure Firewall policy. The following widgets are available in the Network rules tab:
82
+
The **Network rules** tab shows Layer 4 related events statistics correlated with your specific network rules in Azure Firewall policy. The following widgets are available in the **Network rules** tab:
84
83
85
84
-**Rule actions**: Displays actions taken by rules.
86
85
-**Target ports**: Shows targeted ports in network traffic.
87
86
-**DNAT actions**: Displays actions of Destination Network Address Translation (DNAT).
88
87
-**GeoLocation**: Shows geographical locations involved in network traffic.
89
88
-**Rule actions, by IP addresses**: Displays rule actions categorized by IP addresses.
90
89
-**Target ports, by Source IP**: Shows targeted ports categorized by source IP addresses.
91
-
-**DNAT'ed over time**: Displays DNAT actions over time.
90
+
-**DNATed over time**: Displays DNAT actions over time.
92
91
-**GeoLocation over time**: Shows geographical locations involved in network traffic over time.
93
92
-**Actions, by time**: Displays network actions over time.
94
93
-**All IP addresses events with GeoLocation**: Shows all events involving IP addresses, categorized by geographical location.
@@ -97,7 +96,7 @@ The Network rules tab shows Layer 4 related events statistics correlated with yo
97
96
98
97
## DNS proxy
99
98
100
-
This tab is relevant if you've set up Azure Firewall to function as a DNS proxy, serving as an intermediary for DNS requests from client virtual machines to a DNS server. The DNS Proxy tab includes various widgets that you can use:
99
+
This tab is relevant if you set up Azure Firewall to function as a DNS proxy, serving as an intermediary for DNS requests from client virtual machines to a DNS server. The DNS Proxy tab includes various widgets that you can use:
101
100
102
101
-**DNS Proxy Traffic by count per Firewall**: Displays DNS proxy traffic count for each firewall.
103
102
-**DNS Proxy count by Request Name**: Counts DNS proxy requests by request name.
@@ -109,7 +108,7 @@ This tab is relevant if you've set up Azure Firewall to function as a DNS proxy,
109
108
110
109
## Intrusion Detection and Prevention System (IDPS)
111
110
112
-
The IDPS log statistics tab offers a summary of malicious traffic events and the preventive actions undertaken by the service. In the IDPS tab, you'll find various widgets that you can use:
111
+
The IDPS log statistics tab provides a summary of malicious traffic events and the preventive actions the service takes. The IDPS tab includes the following widgets:
113
112
114
113
-**IDPS Actions Count**: Counts IDPS actions.
115
114
-**IDPS Protocol Count**: Counts protocols detected by IDPS.
@@ -126,11 +125,11 @@ The IDPS log statistics tab offers a summary of malicious traffic events and the
126
125
127
126
## Threat Intelligence (TI)
128
127
129
-
This tab offers a thorough perspective on threat intelligence activities, spotlighting the most prevalent threats, actions, and protocols. It delineates the top five Fully Qualified Domain Names (FQDNs) and IP addresses associated with these threats, showcasing threat intelligence detections over time. Additionally, detailed logs from Azure Firewall’s Threat Intelligence are furnished for comprehensive analysis. Within the Threat Intelligence tab, you'll find various widgets that you can use:
128
+
This tab provides a comprehensive view of threat intelligence activities, highlighting the most prevalent threats, actions, and protocols. It lists the top five fully qualified domain names (FQDNs) and IP addresses associated with these threats, and shows threat intelligence detections over time. You can also analyze detailed logs from Azure Firewall's Threat Intelligence. The Threat Intelligence tab includes the following widgets:
130
129
131
130
-**Threat Intel Actions Count**: Counts actions detected by Threat Intelligence.
132
131
-**Threat Intel Protocol Count**: Counts protocols identified by Threat Intelligence.
133
-
-**Top 5 FQDN Count**: Displays the top five most frequent Fully Qualified Domain Names (FQDNs).
132
+
-**Top 5 FQDN Count**: Displays the top five most frequent fully qualified domain names (FQDNs).
134
133
-**Top 5 IP Count**: Shows the top five most frequent IP addresses.
135
134
-**Azure Firewall Threat Intel Over Time**: Displays Azure Firewall Threat Intelligence detections over time.
@@ -139,18 +138,18 @@ This tab offers a thorough perspective on threat intelligence activities, spotli
139
138
140
139
## Investigations
141
140
142
-
The investigation section enables exploration and troubleshooting, offering additional details such as the virtual machine name and network interface name associated with the initiation or termination of traffic. It also establishes correlations between source IP addresses, the Fully Qualified Domain Names (FQDNs) they attempt to access as well as geographical location view of your traffic. Widgets available in the Investigation tab:
141
+
The investigation section enables exploration and troubleshooting. It provides extra details such as the virtual machine name and network interface name associated with the initiation or termination of traffic. It also establishes correlations between source IP addresses and the fully qualified domain names (FQDNs) they attempt to access, along with a geographical location view of your traffic. The Investigation tab includes the following widgets:
143
142
144
-
-**FQDN Traffic by Count**: Counts traffic by Fully Qualified Domain Names (FQDNs).
143
+
-**FQDN Traffic by Count**: Counts traffic by fully qualified domain names (FQDNs).
145
144
-**Source IP Address count**: Counts occurrences of source IP addresses.
146
145
-**Source IP Address Resource Lookup**: Looks up resources associated with source IP addresses.
147
146
-**FQDN Lookup logs**: Provides logs from FQDN lookups.
148
-
-**Azure Firewall Premium with Geo Location – IDPS**: Displays Azure Firewall's Intrusion Detection and Prevention System - (IDPS) - detections, categorized by geographical location.
147
+
-**Azure Firewall Premium with Geo Location – IDPS**: Displays Azure Firewall's Intrusion Detection and Prevention System (IDPS) detections, categorized by geographical location.
149
148
150
149
:::image type="content" source="media/firewall-workbook/investigation-tab.png" alt-text="Screenshot showing the investigation tab." lightbox="media/firewall-workbook/investigation-tab.png":::
151
150
152
151
153
152
## Next steps
154
153
155
-
- Learn more about [Azure Firewall Diagnostics](firewall-diagnostics.md)
156
-
- Learn how to [Track rule set changes](rule-set-change-tracking.md) using Azure Resource Graph
154
+
- Learn more about [Azure Firewall diagnostics](monitor-firewall.md).
155
+
- Learn how to [Track rule set changes](rule-set-change-tracking.md) using Azure Resource Graph.
0 commit comments