Skip to content

Commit a0aa2f1

Browse files
committed
tweaks
1 parent 41a592d commit a0aa2f1

2 files changed

Lines changed: 19 additions & 21 deletions

File tree

Binary file not shown.

articles/network-watcher/traffic-analytics-what-if.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ ms.topic: how-to
1111

1212
# Use rule impact analyzer in traffic analytics
1313

14-
In this article, you learn how to use the Rule Impact Analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin rule, and simulate the impact of your rule changes before deploying them.
14+
In this article, you learn how to use the rule impact analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin rule, and simulate the impact of your rule changes before deploying them.
1515

16-
The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that connectivity requirements are met without disrupting live traffic. By understanding the impact of your proposed rules changes, you can confidently plan changes, maintain compliance, and reduce the risk of misconfiguration across your virtual networks.
16+
The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that connectivity requirements are met without disrupting live traffic. By understanding the impact of your proposed rules changes, you can confidently plan changes, maintain compliance, and reduce the risk of misconfiguration across your virtual networks.
1717

1818
## Prerequisites
1919

@@ -23,31 +23,30 @@ The Rules Impact Analyzer enables you to preview the impact of security admin ru
2323

2424
- Required role-based access control (RBAC) permissions. For more information, see [Trafic analytics RBAC Permissions](required-rbac-permissions.md#traffic-analytics).
2525

26-
- A network group. If you don't have a network group, see [Create a network group](../virtual-network-manager/create-virtual-network-manager-portal#create-a-network-group).
26+
- A network group. If you don't have a network group, see [Create a network group](../virtual-network-manager/create-virtual-network-manager-portal.md#create-a-network-group).
2727

28-
## Workflow and Step-by-Step guide for Rules Impact Analysis
29-
30-
onfiguring network security across multiple environments requires careful planning. The Rule Impact Analyzer provides a safe way to validate security admin rules before they are applied, helping you understand their impact and avoid disruptions. By simulating changes first, you gain confidence that your rules will work as intended and maintain compliance without affecting live traffic.
3128

3229
## How does Rule Impact Analysis Work?
3330

34-
By using the Rule Impact Analyzer, you gain visibility and control over your network security posture, without the risk of making disruptive changes. Here is an overview of the workflow for rule simulation :
31+
By using the rules impact analyzer, you gain visibility and control over your network security posture, without the risk of making disruptive changes. Here is an overview of the workflow for rule simulation:
32+
33+
1. In the search box at the top of the portal, enter *network watcher*. Select **Network Watcher** from the search results.
3534

36-
1. :::image type="content" source="media/traffic-analytics-what-if/image1.png" alt-text="":::Enable Traffic Analytics for the relevant virtual networks, as simulation relies on traffic data collected through Traffic Analytics.
35+
1. Under **Monitoring**, select **Traffic Analytics**.
3736

38-
2. To set the scope for simulation, choose the network groups that contain the resources you want to evaluate.
37+
1. Select **Open Rule Impact Analyzer**.
3938

40-
Add
39+
1. To set the scope for simulation, select the network group that contains the resources you want to evaluate.
4140

42-
3. :::image type="content" source="media/traffic-analytics-what-if/image2.png" alt-text="":::the security admin rules you plan to deploy
41+
:::image type="content" source="media/traffic-analytics-what-if/image2.png" alt-text="":::the security admin rules you plan to deploy
4342

44-
4. The simulation engine analyses how these rules would interact with your current configuration.
43+
1. Select **Next**.
4544

46-
5. The simulation engine calculates the effective outcome without applying changes to live traffic.
45+
The simulation engine analyzes how these rules would interact with your current configuration. It calculates the effective outcome without applying changes to live traffic.
4746

48-
6. Review the simulation report.
47+
1. Review the simulation report.
4948

50-
7. Deploy the rules
49+
1. Deploy the rules
5150

5251
## Step-by-Step Guide
5352

@@ -83,7 +82,7 @@ After selecting the rules to analyze, you must specify the scope of the evaluati
8382

8483
- Select one or more Virtual Networks (up to 500) that show Traffic Analytics: **Enabled**.
8584

86-
- Click **Apply**.
85+
- Select **Apply**.
8786

8887
- The system analyses the rules against your current configuration.
8988

@@ -112,12 +111,11 @@ The table lists all target virtual networks analysed during the simulation and s
112111
| Flows Breaking | Number of traffic flows that would be disrupted if the impacting rule were deployed. A value of 0 indicates no traffic breakage. | 2,184,434 |
113112
| Query | Action link to view the underlying query used to compute the simulation result for that VNet. | View Query |
114113

115-
For impacted virtual networks, the report identifies the **impacting rule**, its p**riority**, and the **number of** f**lows breaking**, helping you assess the severity of the change. Use **View Query** to inspect the underlying query and validate the result before deploying the rules.
116-
117-
# Related content
114+
For impacted virtual networks, the report identifies the **impacting rule**, its **priority**, and the **number of flows breaking**, helping you assess the severity of the change. Use **View Query** to inspect the underlying query and validate the result before deploying the rules.
118115

116+
## Related content
119117

120-
- [Create a security admin rule using network groups - Azure Virtual Network Manager \| Microsoft Learn](https://learn.microsoft.com/en-us/azure/virtual-network-manager/how-to-create-security-admin-rule-network-group)
118+
- [Create a security admin rule using network groups](/azure/virtual-network-manager/how-to-create-security-admin-rule-network-group)
121119

122-
- [View configurations applied by Azure Virtual Network Manager \| Microsoft Learn](https://learn.microsoft.com/en-gb/azure/virtual-network-manager/how-to-view-applied-configurations)
120+
- [View configurations applied by Azure Virtual Network Manager](/azure/virtual-network-manager/how-to-view-applied-configurations)
123121

0 commit comments

Comments
 (0)