Skip to content

Commit 9573221

Browse files
committed
update
1 parent b0ce10c commit 9573221

7 files changed

Lines changed: 34 additions & 25 deletions

File tree

articles/security/fundamentals/azure-domains.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: mbaldwin
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 04/11/2025
12+
ms.date: 01/06/2026
1313
---
1414
# Reference list of Azure domains (not comprehensive)
1515

@@ -31,7 +31,8 @@ This page is a partial list of the Azure domains in use. Some of them are REST A
3131
|[Azure Cosmos DB](/azure/cosmos-db/)|*.cosmos.azure.com|
3232
|[Azure Cosmos DB](/azure/cosmos-db/)|*.documents.azure.com|
3333
|[Azure Files](../../storage/files/storage-files-introduction.md)|*.file.core.windows.net|
34-
|[Azure Front Door](https://azure.microsoft.com/services/frontdoor/)|*.azurefd.net|
34+
|[Azure Front Door](/azure/frontdoor/) (classic)|*.azurefd.net|
35+
|[Azure Front Door](/azure/frontdoor/) Standard/Premium|*.z01.azurefd.net|
3536
|[Azure Key Vault](/azure/key-vault/general/overview)| *.vault.azure.net|
3637
|[Azure Kubernetes Service](/azure/aks/)|*.azmk8s.io|
3738
|Azure Management Services|*.management.core.windows.net|
@@ -40,7 +41,7 @@ This page is a partial list of the Azure domains in use. Some of them are REST A
4041
|[Azure Queue Storage](https://azure.microsoft.com/services/storage/queues/)|*.queue.core.windows.net|
4142
|[Azure Service Bus](../../service-bus-messaging/service-bus-messaging-overview.md)|*.servicebus.windows.net|
4243
|[Azure SQL Database](https://azure.microsoft.com/services/sql-database/)|*.database.windows.net|
43-
|[Azure Stack Edge](https://azure.microsoft.com/products/azure-stack/edge/) and [Azure IoT Edge](https://azure.microsoft.com/services/iot-edge/)|*.azureedge.net|
44+
|[Azure CDN](/azure/cdn/) (migrated to [Azure Front Door](/azure/frontdoor/))|*.azureedge.net|
4445
|[Azure Table Storage](../../storage/tables/table-storage-overview.md)|*.table.core.windows.net|
4546
|[Azure Traffic Manager](../../traffic-manager/traffic-manager-overview.md)|*.trafficmanager.net|
4647
|Azure Websites|*.azurewebsites.net|

articles/security/fundamentals/isolation-choices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: security
77
ms.subservice: security-fundamentals
88
ms.topic: article
9-
ms.date: 12/03/2025
9+
ms.date: 01/06/2026
1010
ms.author: mbaldwin
1111

1212
---
@@ -305,10 +305,10 @@ Azure deployment has multiple layers of network isolation. The following diagram
305305

306306
**Traffic isolation:** A [virtual network](../../virtual-network/virtual-networks-overview.md) is the traffic isolation boundary on the Azure platform. Virtual machines (VMs) in one virtual network cannot communicate directly to VMs in a different virtual network, even if both virtual networks are created by the same customer. Isolation is a critical property that ensures customer VMs and communication remains private within a virtual network.
307307

308-
[Subnet](../../virtual-network/virtual-networks-overview.md) offers an additional layer of isolation with in virtual network based on IP range. IP addresses in the virtual network, you can divide a virtual network into multiple subnets for organization and security. VMs and PaaS role instances deployed to subnets (same or different) within a VNet can communicate with each other without any extra configuration. You can also configure [network security group (NSGs)](../../virtual-network/virtual-networks-overview.md) to allow or deny network traffic to a VM instance based on rules configured in access control list (ACL) of NSG. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet.
308+
[Subnet](../../virtual-network/virtual-networks-overview.md) offers an additional layer of isolation with in virtual network based on IP range. IP addresses in the virtual network, you can divide a virtual network into multiple subnets for organization and security. VMs and PaaS role instances deployed to subnets (same or different) within a VNet can communicate with each other without any extra configuration. You can also configure [network security groups (NSGs)](../../virtual-network/network-security-groups-overview.md) to allow or deny network traffic to a VM instance based on security rules. NSGs can be associated with either subnets or individual network interfaces attached to VMs. When an NSG is associated with a subnet, the security rules apply to all the VM instances in that subnet.
309309

310310
## Next Steps
311311

312-
- Learn about [Network Isolation Options for Machines in Windows Azure Virtual Networks](https://azure.microsoft.com/blog/network-isolation-options-for-machines-in-windows-azure-virtual-networks/). This includes the classic front-end and back-end scenario where machines in a particular back-end network or subnetwork may only allow certain clients or other computers to connect to a particular endpoint based on an allowlist of IP addresses.
312+
- Learn about [network security groups](/azure/virtual-network/network-security-groups-overview). Network security groups filter network traffic between Azure resources in a virtual network, allowing you to restrict traffic to subnets or virtual machines based on source, destination, port, and protocol using security rules.
313313

314314
- Learn about [virtual machine isolation in Azure](/azure/virtual-machines/isolation). Azure Compute offers virtual machine sizes that are isolated to a specific hardware type and dedicated to a single customer.

articles/security/fundamentals/pen-testing.md

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.assetid: 695d918c-a9ac-4eba-8692-af4526734ccc
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article
10-
ms.date: 04/23/2025
10+
ms.date: 01/06/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -23,21 +23,36 @@ As of June 15, 2017, Microsoft no longer requires pre-approval to conduct a pene
2323
> [!IMPORTANT]
2424
> While notifying Microsoft of pen testing activities is no longer required customers must still comply with the [Microsoft Cloud Unified Penetration Testing Rules of Engagement](https://www.microsoft.com/msrc/pentest-rules-of-engagement).
2525
26+
## Permitted testing
27+
28+
You can perform penetration testing on your own Azure-hosted applications and services without prior approval. This includes testing:
29+
30+
* Your endpoints hosted on Azure Virtual Machines
31+
* Azure App Service applications (Web Apps, API Apps, Mobile Apps)
32+
* Azure Functions and API endpoints
33+
* Azure Websites
34+
* Any other Azure services where you own or have explicit authorization to test the deployed resources
35+
2636
Standard tests you can perform include:
2737

2838
* Tests on your endpoints to uncover the [Open Web Application Security Project (OWASP) top 10 vulnerabilities](https://owasp.org/www-project-top-ten/)
39+
* Dynamic Application Security Testing (DAST) of your web applications and APIs
2940
* [Fuzz testing](https://www.microsoft.com/research/blog/a-brief-introduction-to-fuzzing-and-why-its-an-important-tool-for-developers/) of your endpoints
3041
* [Port scanning](https://en.wikipedia.org/wiki/Port_scanner) of your endpoints
3142

43+
## Prohibited testing
44+
3245
One type of pen test that you can't perform is any kind of [Denial of Service (DoS)](https://en.wikipedia.org/wiki/Denial-of-service_attack) attack. This test includes initiating a DoS attack itself, or performing related tests that might determine, demonstrate, or simulate any type of DoS attack.
3346

34-
> [!Note]
35-
> You may only simulate attacks using Microsoft approved testing partners:
36-
> - [BreakingPoint Cloud](https://www.ixiacom.com/products/breakingpoint-cloud): A self-service traffic generator where your customers can generate traffic against DDoS Protection-enabled public endpoints for simulations.
37-
> - [Red Button](https://www.red-button.net/): Work with a dedicated team of experts to simulate real-world DDoS attack scenarios in a controlled environment.
38-
> - [RedWolf](https://www.redwolfsecurity.com/services/#cloud-ddos) a self-service or guided DDoS testing provider with real-time control.
39-
>
40-
> To learn more about these simulation partners, see [testing with simulation partners](../../ddos-protection/test-through-simulations.md).
47+
## DDoS simulation testing
48+
49+
If you need to test your DDoS resilience, you can use Microsoft-approved simulation partners. These partners provide controlled DDoS simulation services that don't violate the penetration testing rules:
50+
51+
- [BreakingPoint Cloud](https://www.ixiacom.com/products/breakingpoint-cloud): A self-service traffic generator where your customers can generate traffic against DDoS Protection-enabled public endpoints for simulations.
52+
- [Red Button](https://www.red-button.net/): Work with a dedicated team of experts to simulate real-world DDoS attack scenarios in a controlled environment.
53+
- [RedWolf](https://www.redwolfsecurity.com/services/#cloud-ddos): A self-service or guided DDoS testing provider with real-time control.
54+
55+
To learn more about these simulation partners, see [testing with simulation partners](../../ddos-protection/test-through-simulations.md).
4156

4257
## Next steps
4358

articles/security/fundamentals/ransomware-detect-respond.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/16/2025
9+
ms.date: 01/06/2026
1010

1111
---
1212

@@ -82,8 +82,6 @@ Our Rapid Ransomware Recovery services are treated as "Confidential" for the dur
8282

8383
For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
8484

85-
See the white paper: [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack).
86-
8785
Other Azure ransomware articles:
8886

8987
- [Ransomware protection in Azure](ransomware-protection.md)

articles/security/fundamentals/ransomware-features-resources.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/16/2025
9+
ms.date: 01/06/2026
1010
---
1111

1212
# Azure features & resources that help you protect, detect, and respond to ransomware attacks
@@ -136,8 +136,6 @@ For detailed information on how Microsoft secures our cloud, visit the [service
136136

137137
For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
138138

139-
See the white paper: [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack).
140-
141139
Other Azure ransomware articles:
142140

143141
- [Ransomware protection in Azure](ransomware-protection.md)

articles/security/fundamentals/ransomware-prepare.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/23/2025
9+
ms.date: 01/06/2026
1010
---
1111

1212
# Prepare for a ransomware attack
@@ -147,8 +147,6 @@ For detailed guidance, see [Backup and restore plan to protect against ransomwar
147147

148148
For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
149149

150-
See the white paper: [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack).
151-
152150
Other Azure ransomware articles:
153151

154152
- [Ransomware protection in Azure](ransomware-protection.md)

articles/security/fundamentals/ransomware-protection.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 05/01/2025
9+
ms.date: 01/06/2026
1010

1111
---
1212

@@ -73,7 +73,6 @@ Azure-specific ransomware protection articles:
7373
- [Improve your security defenses for ransomware attacks with Azure Firewall Premium](ransomware-protection-with-azure-firewall.md)
7474

7575
Additional resources:
76-
- [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack)
7776
- [What is ransomware?](/security/ransomware/human-operated-ransomware)
7877

7978

0 commit comments

Comments
 (0)