Skip to content

Commit 8d1646e

Browse files
committed
docs: fix metadata, title, stale language, alt text, fix stale redirected links, style edits
1 parent 6fcc5ac commit 8d1646e

1 file changed

Lines changed: 33 additions & 34 deletions

File tree

Lines changed: 33 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,55 +1,54 @@
11
---
2-
title: Using Azure Firewall Workbooks
2+
title: Use Azure Firewall workbooks
33
description: Azure Firewall Workbooks provide a flexible canvas for Azure Firewall data analysis and the creation of rich visual reports within the Azure portal.
4-
services: firewall
54
author: gopimsft
5+
ms.author: duau
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 12/06/2023
9-
ms.author: duau
8+
ms.date: 03/28/2026
109
ms.custom: sfi-image-nochange
1110
# Customer intent: As a network administrator, I want to analyze and visualize Azure Firewall data using workbooks, so that I can gain insights into firewall events and enhance security monitoring across multiple firewalls in the Azure environment.
1211
---
1312

14-
# Using Azure Firewall Workbooks
13+
# Use Azure Firewall workbooks
1514

16-
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You can use it to create rich visual reports within the Azure portal. You can tap into multiple Firewalls deployed across Azure, and combine them into unified interactive experiences.
15+
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. Use it to create rich visual reports within the Azure portal. You can tap into multiple Firewalls deployed across Azure, and combine them into unified interactive experiences.
1716

18-
You can gain insights into Azure Firewall events, learn about your application and network rules, and see statistics for firewall activities across URLs, ports, and addresses. Azure Firewall Workbook allows you to filter your firewalls and resource groups, and dynamically filter per category with easy to read data sets when investigating an issue in your logs.
17+
You can gain insights into Azure Firewall events, learn about your application and network rules, and see statistics for firewall activities across URLs, ports, and addresses. Azure Firewall Workbook allows you to filter your firewalls and resource groups, and dynamically filter per category with easy-to-read data sets when investigating an issue in your logs.
1918

2019
## Prerequisites
2120

22-
Before you start, enable [Azure Structured Firewall Logs](firewall-structured-logs.md) through the Azure portal.
21+
Before you start, enable [Azure Structured Firewall Logs](monitor-firewall.md) through the Azure portal.
2322

2423
> [!IMPORTANT]
2524
> All the following sections are valid for Firewall structured logs only.
26-
>
25+
>
2726
28-
If you want to use legacy logs, you can enable [diagnostic logging](firewall-diagnostics.md#enable-diagnostic-logging-through-the-azure-portal) using the Azure portal. Then go to [GitHub Workbook for Azure Firewall](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Workbook%20-%20Azure%20Firewall%20Monitor%20Workbook) and follow the instructions on the page.
27+
If you want to use legacy logs, you can enable [diagnostic logging](monitor-firewall.md) by using the Azure portal. Then go to [GitHub Workbook for Azure Firewall](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20Firewall/Workbook%20-%20Azure%20Firewall%20Monitor%20Workbook) and follow the instructions on the page.
2928

3029

31-
Also, read [Azure Firewall logs and metrics](logs-and-metrics.md) for an overview of the diagnostics logs and metrics available for Azure Firewall.
30+
Also, read [Azure Firewall logs and metrics](monitor-firewall.md) for an overview of the diagnostics logs and metrics available for Azure Firewall.
3231

3332
## Get started
3433

35-
Once you've set up Firewall structured logs, you're all set to use the Azure Firewall embedded workbooks using the following steps:
34+
After you set up Firewall structured logs, use the Azure Firewall embedded workbooks by following these steps:
3635

37-
1. In the portal, navigate to your Azure Firewall resource.
36+
1. In the portal, go to your Azure Firewall resource.
3837
2. Under **Monitoring**, select **Workbooks**.
39-
3. In the Gallery, you can create new workbooks or use the existing Azure Firewall workbook as shown here:
38+
3. In the gallery, you can create new workbooks or use the existing Azure Firewall workbook as shown in the following image:
4039

4140
:::image type="content" source="media/firewall-workbook/firewall-workbook-gallery.png" alt-text="Screenshot showing the firewall workbook gallery." lightbox="media/firewall-workbook/firewall-workbook-gallery.png":::
42-
4. Select the log analytics workspace and one or more firewall names you want to use in this workbook as shown here:
41+
4. Select the Log Analytics workspace and one or more firewall names you want to use in this workbook as shown in the following image:
4342

44-
:::image type="content" source="media/firewall-workbook/structured-logs.png" alt-text="Screenshot showing structured logs." lightbox="media/firewall-workbook/structured-logs.png" :::
43+
:::image type="content" source="media/firewall-workbook/structured-logs.png" alt-text="Screenshot showing workspace and Azure Firewall selections in the workbook." lightbox="media/firewall-workbook/structured-logs.png" :::
4544

4645
## Workbook sections
4746

4847
The Azure Firewall workbook has seven tabs, each addressing distinct aspects of the service. The following sections describe each tab.
4948

5049
### Overview
5150

52-
The overview tab showcases graphs and statistics related to all types of firewall events aggregated from various logging categories. This includes network rules, application rules, DNS, Intrusion Detection and Prevention System (IDPS), Threat Intelligence, and more. The available widgets in Overview tab include:
51+
The overview tab shows graphs and statistics related to all types of firewall events aggregated from various logging categories. This aggregation includes network rules, application rules, DNS, Intrusion Detection and Prevention System (IDPS), Threat Intelligence, and more. The available widgets in the Overview tab include:
5352

5453
- **Events, by time**: Displays event frequency over time.
5554
- **Events, by firewall over time**: Shows event distribution across firewalls over time.
@@ -60,17 +59,17 @@ The overview tab showcases graphs and statistics related to all types of firewal
6059
- **Network Rule Hit count (SUM)**: Counts network rule triggers.
6160
- **Application Rule Hit count (SUM)**: Counts application rule triggers.
6261

63-
:::image type="content" source="./media/firewall-workbook/firewall-workbook-overview.png" alt-text="Azure Firewall Workbook overview":::
62+
:::image type="content" source="./media/firewall-workbook/firewall-workbook-overview.png" alt-text="Screenshot showing the Azure Firewall Workbook overview tab." lightbox="./media/firewall-workbook/firewall-workbook-overview.png":::
6463

6564
## Application rules
6665

67-
The Application rules tab shows Layer 7 related events statistics correlated with your specific application rules in Azure Firewall policy. The following widgets are available in the Application rules tab:
66+
The **Application rules** tab shows Layer 7 related events statistics correlated with your specific application rules in Azure Firewall policy. The following widgets are available in the **Application rules** tab:
6867

6968
- **Application Rule Usage**: Shows usage of application rules.
70-
- **Denied FQDN's overtime**: Displays denied Fully Qualified Domain Names (FQDNs) over time.
71-
- **Denied FQDN's by count**: Counts denied FQDNs.
72-
- **Allowed FQDN's overtime**: Displays allowed FQDNs over time.
73-
- **Allowed FQDN's by count**: Counts allowed FQDNs.
69+
- **Denied FQDNs over time**: Displays denied Fully Qualified Domain Names (FQDNs) over time.
70+
- **Denied FQDNs by count**: Counts denied FQDNs.
71+
- **Allowed FQDNs over time**: Displays allowed FQDNs over time.
72+
- **Allowed FQDNs by count**: Counts allowed FQDNs.
7473
- **Allowed Web Categories overtime**: Shows allowed web categories over time.
7574
- **Allowed Web Categories by count**: Counts allowed web categories.
7675
- **Denied Web Categories overtime**: Displays denied web categories over time.
@@ -80,15 +79,15 @@ The Application rules tab shows Layer 7 related events statistics correlated wit
8079

8180
## Network rules
8281

83-
The Network rules tab shows Layer 4 related events statistics correlated with your specific network rules in Azure Firewall policy. The following widgets are available in the Network rules tab:
82+
The **Network rules** tab shows Layer 4 related events statistics correlated with your specific network rules in Azure Firewall policy. The following widgets are available in the **Network rules** tab:
8483

8584
- **Rule actions**: Displays actions taken by rules.
8685
- **Target ports**: Shows targeted ports in network traffic.
8786
- **DNAT actions**: Displays actions of Destination Network Address Translation (DNAT).
8887
- **GeoLocation**: Shows geographical locations involved in network traffic.
8988
- **Rule actions, by IP addresses**: Displays rule actions categorized by IP addresses.
9089
- **Target ports, by Source IP**: Shows targeted ports categorized by source IP addresses.
91-
- **DNAT'ed over time**: Displays DNAT actions over time.
90+
- **DNATed over time**: Displays DNAT actions over time.
9291
- **GeoLocation over time**: Shows geographical locations involved in network traffic over time.
9392
- **Actions, by time**: Displays network actions over time.
9493
- **All IP addresses events with GeoLocation**: Shows all events involving IP addresses, categorized by geographical location.
@@ -97,7 +96,7 @@ The Network rules tab shows Layer 4 related events statistics correlated with yo
9796

9897
## DNS proxy
9998

100-
This tab is relevant if you've set up Azure Firewall to function as a DNS proxy, serving as an intermediary for DNS requests from client virtual machines to a DNS server. The DNS Proxy tab includes various widgets that you can use:
99+
This tab is relevant if you set up Azure Firewall to function as a DNS proxy, serving as an intermediary for DNS requests from client virtual machines to a DNS server. The DNS Proxy tab includes various widgets that you can use:
101100

102101
- **DNS Proxy Traffic by count per Firewall**: Displays DNS proxy traffic count for each firewall.
103102
- **DNS Proxy count by Request Name**: Counts DNS proxy requests by request name.
@@ -109,7 +108,7 @@ This tab is relevant if you've set up Azure Firewall to function as a DNS proxy,
109108

110109
## Intrusion Detection and Prevention System (IDPS)
111110

112-
The IDPS log statistics tab offers a summary of malicious traffic events and the preventive actions undertaken by the service. In the IDPS tab, you'll find various widgets that you can use:
111+
The IDPS log statistics tab provides a summary of malicious traffic events and the preventive actions the service takes. The IDPS tab includes the following widgets:
113112

114113
- **IDPS Actions Count**: Counts IDPS actions.
115114
- **IDPS Protocol Count**: Counts protocols detected by IDPS.
@@ -126,11 +125,11 @@ The IDPS log statistics tab offers a summary of malicious traffic events and the
126125

127126
## Threat Intelligence (TI)
128127

129-
This tab offers a thorough perspective on threat intelligence activities, spotlighting the most prevalent threats, actions, and protocols. It delineates the top five Fully Qualified Domain Names (FQDNs) and IP addresses associated with these threats, showcasing threat intelligence detections over time. Additionally, detailed logs from Azure Firewalls Threat Intelligence are furnished for comprehensive analysis. Within the Threat Intelligence tab, you'll find various widgets that you can use:
128+
This tab provides a comprehensive view of threat intelligence activities, highlighting the most prevalent threats, actions, and protocols. It lists the top five fully qualified domain names (FQDNs) and IP addresses associated with these threats, and shows threat intelligence detections over time. You can also analyze detailed logs from Azure Firewall's Threat Intelligence. The Threat Intelligence tab includes the following widgets:
130129

131130
- **Threat Intel Actions Count**: Counts actions detected by Threat Intelligence.
132131
- **Threat Intel Protocol Count**: Counts protocols identified by Threat Intelligence.
133-
- **Top 5 FQDN Count**: Displays the top five most frequent Fully Qualified Domain Names (FQDNs).
132+
- **Top 5 FQDN Count**: Displays the top five most frequent fully qualified domain names (FQDNs).
134133
- **Top 5 IP Count**: Shows the top five most frequent IP addresses.
135134
- **Azure Firewall Threat Intel Over Time**: Displays Azure Firewall Threat Intelligence detections over time.
136135
- **Azure Firewall Threat Intel**: Provides logs from Azure Firewall's Threat Intelligence.
@@ -139,18 +138,18 @@ This tab offers a thorough perspective on threat intelligence activities, spotli
139138

140139
## Investigations
141140

142-
The investigation section enables exploration and troubleshooting, offering additional details such as the virtual machine name and network interface name associated with the initiation or termination of traffic. It also establishes correlations between source IP addresses, the Fully Qualified Domain Names (FQDNs) they attempt to access as well as geographical location view of your traffic. Widgets available in the Investigation tab:
141+
The investigation section enables exploration and troubleshooting. It provides extra details such as the virtual machine name and network interface name associated with the initiation or termination of traffic. It also establishes correlations between source IP addresses and the fully qualified domain names (FQDNs) they attempt to access, along with a geographical location view of your traffic. The Investigation tab includes the following widgets:
143142

144-
- **FQDN Traffic by Count**: Counts traffic by Fully Qualified Domain Names (FQDNs).
143+
- **FQDN Traffic by Count**: Counts traffic by fully qualified domain names (FQDNs).
145144
- **Source IP Address count**: Counts occurrences of source IP addresses.
146145
- **Source IP Address Resource Lookup**: Looks up resources associated with source IP addresses.
147146
- **FQDN Lookup logs**: Provides logs from FQDN lookups.
148-
- **Azure Firewall Premium with Geo Location – IDPS**: Displays Azure Firewall's Intrusion Detection and Prevention System - (IDPS) - detections, categorized by geographical location.
147+
- **Azure Firewall Premium with Geo Location – IDPS**: Displays Azure Firewall's Intrusion Detection and Prevention System (IDPS) detections, categorized by geographical location.
149148

150149
:::image type="content" source="media/firewall-workbook/investigation-tab.png" alt-text="Screenshot showing the investigation tab." lightbox="media/firewall-workbook/investigation-tab.png":::
151150

152151

153152
## Next steps
154153

155-
- Learn more about [Azure Firewall Diagnostics](firewall-diagnostics.md)
156-
- Learn how to [Track rule set changes](rule-set-change-tracking.md) using Azure Resource Graph
154+
- Learn more about [Azure Firewall diagnostics](monitor-firewall.md).
155+
- Learn how to [Track rule set changes](rule-set-change-tracking.md) using Azure Resource Graph.

0 commit comments

Comments
 (0)