You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/traffic-analytics-what-if.md
+19-21Lines changed: 19 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,9 @@ ms.topic: how-to
11
11
12
12
# Use rule impact analyzer in traffic analytics
13
13
14
-
In this article, you learn how to use the Rule Impact Analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin rule, and simulate the impact of your rule changes before deploying them.
14
+
In this article, you learn how to use the rule impact analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin rule, and simulate the impact of your rule changes before deploying them.
15
15
16
-
The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that connectivity requirements are met without disrupting live traffic. By understanding the impact of your proposed rules changes, you can confidently plan changes, maintain compliance, and reduce the risk of misconfiguration across your virtual networks.
16
+
The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that connectivity requirements are met without disrupting live traffic. By understanding the impact of your proposed rules changes, you can confidently plan changes, maintain compliance, and reduce the risk of misconfiguration across your virtual networks.
17
17
18
18
## Prerequisites
19
19
@@ -23,31 +23,30 @@ The Rules Impact Analyzer enables you to preview the impact of security admin ru
23
23
24
24
- Required role-based access control (RBAC) permissions. For more information, see [Trafic analytics RBAC Permissions](required-rbac-permissions.md#traffic-analytics).
25
25
26
-
- A network group. If you don't have a network group, see [Create a network group](../virtual-network-manager/create-virtual-network-manager-portal#create-a-network-group).
26
+
- A network group. If you don't have a network group, see [Create a network group](../virtual-network-manager/create-virtual-network-manager-portal.md#create-a-network-group).
27
27
28
-
## Workflow and Step-by-Step guide for Rules Impact Analysis
29
-
30
-
onfiguring network security across multiple environments requires careful planning. The Rule Impact Analyzer provides a safe way to validate security admin rules before they are applied, helping you understand their impact and avoid disruptions. By simulating changes first, you gain confidence that your rules will work as intended and maintain compliance without affecting live traffic.
31
28
32
29
## How does Rule Impact Analysis Work?
33
30
34
-
By using the Rule Impact Analyzer, you gain visibility and control over your network security posture, without the risk of making disruptive changes. Here is an overview of the workflow for rule simulation :
31
+
By using the rules impact analyzer, you gain visibility and control over your network security posture, without the risk of making disruptive changes. Here is an overview of the workflow for rule simulation:
32
+
33
+
1. In the search box at the top of the portal, enter *network watcher*. Select **Network Watcher** from the search results.
35
34
36
-
1. :::image type="content" source="media/traffic-analytics-what-if/image1.png" alt-text="":::Enable Traffic Analytics for the relevant virtual networks, as simulation relies on traffic data collected through Traffic Analytics.
2. To set the scope for simulation, choose the network groups that contain the resources you want to evaluate.
37
+
1. Select **Open Rule Impact Analyzer**.
39
38
40
-
Add
39
+
1. To set the scope for simulation, select the network group that contains the resources you want to evaluate.
41
40
42
-
3. :::image type="content" source="media/traffic-analytics-what-if/image2.png" alt-text="":::the security admin rules you plan to deploy
41
+
:::image type="content" source="media/traffic-analytics-what-if/image2.png" alt-text="":::the security admin rules you plan to deploy
43
42
44
-
4.The simulation engine analyses how these rules would interact with your current configuration.
43
+
1.Select **Next**.
45
44
46
-
5.The simulation engine calculates the effective outcome without applying changes to live traffic.
45
+
The simulation engine analyzes how these rules would interact with your current configuration. It calculates the effective outcome without applying changes to live traffic.
47
46
48
-
6. Review the simulation report.
47
+
1. Review the simulation report.
49
48
50
-
7. Deploy the rules
49
+
1. Deploy the rules
51
50
52
51
## Step-by-Step Guide
53
52
@@ -83,7 +82,7 @@ After selecting the rules to analyze, you must specify the scope of the evaluati
83
82
84
83
- Select one or more Virtual Networks (up to 500) that show Traffic Analytics: **Enabled**.
85
84
86
-
-Click**Apply**.
85
+
-Select**Apply**.
87
86
88
87
- The system analyses the rules against your current configuration.
89
88
@@ -112,12 +111,11 @@ The table lists all target virtual networks analysed during the simulation and s
112
111
| Flows Breaking | Number of traffic flows that would be disrupted if the impacting rule were deployed. A value of 0 indicates no traffic breakage. | 2,184,434 |
113
112
| Query | Action link to view the underlying query used to compute the simulation result for that VNet. | View Query |
114
113
115
-
For impacted virtual networks, the report identifies the **impacting rule**, its p**riority**, and the **number of** f**lows breaking**, helping you assess the severity of the change. Use **View Query** to inspect the underlying query and validate the result before deploying the rules.
116
-
117
-
# Related content
114
+
For impacted virtual networks, the report identifies the **impacting rule**, its **priority**, and the **number of flows breaking**, helping you assess the severity of the change. Use **View Query** to inspect the underlying query and validate the result before deploying the rules.
118
115
116
+
## Related content
119
117
120
-
-[Create a security admin rule using network groups - Azure Virtual Network Manager \| Microsoft Learn](https://learn.microsoft.com/en-us/azure/virtual-network-manager/how-to-create-security-admin-rule-network-group)
118
+
-[Create a security admin rule using network groups](/azure/virtual-network-manager/how-to-create-security-admin-rule-network-group)
121
119
122
-
-[View configurations applied by Azure Virtual Network Manager\| Microsoft Learn](https://learn.microsoft.com/en-gb/azure/virtual-network-manager/how-to-view-applied-configurations)
120
+
-[View configurations applied by Azure Virtual Network Manager](/azure/virtual-network-manager/how-to-view-applied-configurations)
0 commit comments