You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/enable-storage-network-security.md
+34-34Lines changed: 34 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,33 +4,31 @@ description: Learn how to enable network security for Azure Storage connector re
4
4
author: EdB-MSFT
5
5
ms.author: edbaynash
6
6
ms.reviewer: edbaynash
7
-
ms.date: 02/05/2026
7
+
ms.date: 02/08/2026
8
8
ms.topic: how-to
9
9
ms.service: microsoft-sentinel
10
-
11
10
#customer intent: As a security engineer, I want to configure a Network Security Perimeter for storage accounts used in storage blob connectors
12
-
13
11
---
14
12
15
13
# Enable network security on connector integrated storage resources
16
14
17
-
This article provides step-by-step instructions on how to enable network security on the storage resources integrated with your Azure Storage connector. Azure network security perimeter (NSP) is an Azure-native feature that creates a logical isolation boundary for your PaaS resources. By associating resources like storage accounts or databases with an NSP, you can centrally manage network access using a simplified rule set – reference network security perimeters documentation (/azure/private-link/network-security-perimeter-concepts).
15
+
This article provides step-by-step instructions on how to enable network security on the storage resources integrated with your Azure Storage connector. Azure network security perimeter (NSP) is an Azure-native feature that creates a logical isolation boundary for your PaaS resources. By associating resources like storage accounts or databases with an NSP, you can centrally manage network access using a simplified rule set. For more information, see [Network security perimeter concepts](/azure/private-link/network-security-perimeter-concepts).
18
16
19
17
20
18
## Prerequisites
21
19
22
-
Before Enable network security you must create your connector resources. See [Set up your Azure Storage Connector to stream logs to Microsoft Sentinel](setup-azure-storage-connector.md) including an Event Grid System Topic used to stream blob creation events to the Azure Storage queue.
20
+
Before enabling network security, create your connector resources. See [Set up your Azure Storage Connector to stream logs to Microsoft Sentinel](setup-azure-storage-connector.md), including the Event Grid system topic used to stream blob creation events to the Azure Storage queue.
23
21
24
22
To complete this setup, ensure you have the following permissions:
25
23
26
-
- Subscription-level Owner or Contributor to create Security Perimeter resources.
27
-
-Storage Account Contributor to associate the storage account with the NSP.
28
-
-Storage Account User Access Administrator or Owner to assign RBAC roles to the Event Grid managed identity.
29
-
-Event Grid Contributor to enable managed identity and manage event subscriptions.
24
+
- Subscription Owner or Contributor to create network security perimeter resources.
25
+
- Storage Account Contributor to associate the storage account with the NSP.
26
+
- Storage Account User Access Administrator or Owner to assign RBAC roles to the Event Grid managed identity.
27
+
- Event Grid Contributor to enable managed identity and manage event subscriptions.
30
28
31
29
## Enable Network Security
32
30
33
-
To enable network security on the storage resources integrated with your Azure Storage connector, you need to create a Network Security Perimeter (NSP) and associate the storage account with it. Then configure the necessary rules to allow traffic from Event Grid and other relevant sources while blocking unauthorized access. Use the following steps to complete the configuration.
31
+
To enable network security on the storage resources integrated with your Azure Storage connector, create a Network Security Perimeter (NSP), associate the storage account with it, and configure the rules to allow traffic from Event Grid and other required sources while blocking unauthorized access. Use the following steps to complete the configuration.
34
32
35
33
### Create a Network Security Perimeter
36
34
1. In the Azure portal, search for *Network Security Perimeters*
@@ -45,13 +43,13 @@ To enable network security on the storage resources integrated with your Azure S
45
43
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimeter.png" lightbox="./media/enable-storage-network-security/create-network-security-perimeter.png" alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
46
44
47
45
### Associate the Storage Account with the Network Security Perimeter
48
-
1. Open your newly created Network Security Perimeter resource
46
+
1. Open your newly created Network Security Perimeter resource in the Azure portal.
49
47
50
48
1. Select **Profiles**, then select the profile name you used when creating the NSP resource.
51
49
1. Select **Associated resources**.
52
50
1. Select **Add**.
53
51
1. Search for and add your storage account, then select **Select**.
54
-
1. Select **Associate**.
52
+
1. Select **Associate**.
55
53
56
54
The access mode is set to **Transition** by default, allowing you to validate the configuration before enforcing restrictions.
57
55
@@ -68,8 +66,7 @@ The access mode is set to **Transition** by default, allowing you to validate th
68
66
1. Select **Identity**.
69
67
70
68
1. On the **System assigned** tab, set the **Status** to **On**.
71
-
1. Select **Save**.
72
-
1. After saving, copy the **Object ID** of the managed identity for later use.
69
+
1. Select **Save**, then copy the **Object ID** of the managed identity for later use.
73
70
74
71
:::image type="content" source="./media/enable-storage-network-security/create-system-assigned-identity.png" lightbox="./media/enable-storage-network-security/create-system-assigned-identity.png" alt-text="A screenshot showing the creation of a managed identity for an Event Grid System Topic in the Azure portal.":::
75
72
@@ -80,30 +77,30 @@ The access mode is set to **Transition** by default, allowing you to validate th
80
77
81
78
1. Select **Access Control (IAM)**.
82
79
1. Select **Add**.
83
-
1. Search for and select the *Storage Queue Data Message Sender* role.
80
+
1. Search for and select the **Storage Queue Data Message Sender** role (scope: the storage account).
84
81
1. Select the **Members** tab and then **Select members**.
85
-
1. In the **Select members** pane, paste the Object ID for the Event Grid system topic managed identity created in the previous step
86
-
1. Select the managed identity and then click**Select**
87
-
1. Select **Review + assign** to complete the role assignment
82
+
1. In the **Select members** pane, paste the Object ID for the Event Grid system topic managed identity created in the previous step.
83
+
1. Select the managed identity and then select**Select**.
84
+
1. Select **Review + assign** to complete the role assignment.
88
85
:::image type="content" source="./media/enable-storage-network-security/add-role-assignment.png" lightbox="./media/enable-storage-network-security/add-role-assignment.png" alt-text="A screenshot showing the assignment of the Storage Queue Data Message Sender role to a managed identity in the Azure portal.":::
89
86
90
87
91
88
### Enable Managed Identity on the event subscription
92
89
93
90
1. Open the **Event Grid System Topic**.
94
91
95
-
1. Select the event subscription targeting the queue.
92
+
1. Select the event subscription that targets the queue.
96
93
1. Select the **Additional settings** tab.
97
94
1. Set **Managed identity type** to **System-assigned**.
98
95
1. Select **Save**.
99
-
1. Review the Event Grid subscriptions metrics to validate messages are still successfully published to the storage queue after this update.
96
+
1. Review the Event Grid subscription metrics to validate messages are successfully published to the storage queue after this update.
100
97
101
98
:::image type="content" source="./media/enable-storage-network-security/set-additional-features.png" lightbox="./media/enable-storage-network-security/set-additional-features.png" alt-text="A screenshot showing the enabling of managed identity for an Event Grid subscription in the Azure portal.":::
102
99
103
100
104
101
### Configure Inbound Access rules on the Network Security Perimeter profile
105
102
106
-
The following rules are required to allow Event Grid to deliver messages to the storage account while blocking unauthorized access. Depending on the system sending data to the storage account or accessing the storage resources, you may need to add additional inbound rules. Review your scenario and traffic patterns to safely apply the necessary rules.
103
+
The following rules are required to allow Event Grid to deliver messages to the storage account while blocking unauthorized access. Depending on the system sending data to the storage account or accessing the storage resources, you may need to add additional inbound rules. Review your scenario and traffic patterns to safely apply the necessary rules, and allow time for rule propagation.
107
104
108
105
#### Rule 1: Allow the Subscription (Event Grid Delivery)
109
106
@@ -125,7 +122,7 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
125
122
:::image type="content" source="./media/enable-storage-network-security/add-inbound-rule.png" lightbox="./media/enable-storage-network-security/add-inbound-rule.png" alt-text="A screenshot showing the creation of an inbound access rule to allow a subscription in the Azure portal.":::
126
123
127
124
> [!NOTE]
128
-
> Rules can take a few of minutes to appear in the list after creation.
125
+
> Rules can take a few minutes to appear in the list after creation.
129
126
130
127
131
128
#### Rule 2: Allow Scuba service IP ranges
@@ -135,15 +132,15 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
135
132
136
133
1. Enter a **Rule name**, for example `Allow-Scuba`.
137
134
1. Select **IP address ranges** from the **Source type** drop-down.
138
-
1. Open the [service tag download](/azure/virtual-network/service-tags-overview#discover-service-tags-by-using-downloadable-json-files) page.
139
-
1. Select your cloud, for example **Azure Public**.
135
+
1. Open the [service tag download](/azure/virtual-network/service-tags-overview#discover-service-tags-by-using-downloadable-json-files) page.
136
+
1. Select your cloud, for example **Azure Public**.
140
137
1. Select the **Download** button and open the downloaded file to get the list of IP ranges.
141
138
1. Find the `Scuba` service tag and copy the associated IPv4 ranges.
142
139
1. Paste the IPv4 ranges into the **Allowed Sources** field after removing any quotes and trailing commas.
143
140
1. Select **Add** to create the rule.
144
141
145
142
> [!IMPORTANT]
146
-
> Remove the quotes from the IP ranges and ensure that there's no trailing comma on the last entry before pasting them into the **Allowed Sources** field.
143
+
> Remove the quotes from the IP ranges and ensure that there's no trailing comma on the last entry before pasting them into the **Allowed Sources** field. Service tag ranges update over time; refresh regularly to keep rules current.
147
144
148
145
:::image type="content" source="./media/enable-storage-network-security/scuba-ipv4-addresses.png" lightbox="./media/enable-storage-network-security/scuba-ipv4-addresses.png" alt-text="A screenshot showing a part of the ServiceTags_Public.json file with the Scuba service tag and IPv4 ranges highlighted.":::
149
146
@@ -154,39 +151,42 @@ After configuring the rules, monitor the diagnostic logs for the Network Securit
154
151
155
152
#### Transition mode
156
153
157
-
Consider enabling network security perimeters diagnostic logs to review collected telemetry to validate communication patterns before enforcement. For more information, see [Diagnostic logs for Network Security Perimeter](/azure/private-link/network-security-perimeter-diagnostic-logs)
154
+
Enable Network Security Perimeter diagnostic logs and review collected telemetry to validate communication patterns before enforcement. For more information, see [Diagnostic logs for Network Security Perimeter](/azure/private-link/network-security-perimeter-diagnostic-logs).
158
155
159
156
#### Apply Enforcement mode
160
157
161
-
Once validation is successful set the access mode to **Enforced** as follows:
158
+
Once validation is successful, set the access mode to **Enforced** as follows:
162
159
1. From the Network Security Perimeter page, under **Settings**, select **Associated resources**.
163
160
164
161
1. Select the storage account.
165
162
1. Select **Change access mode**.
166
163
1. Select **Enforced** and then **Save**.
167
164
168
-
:::image type="content" source="./media/enable-storage-network-security/change-access-mode.png" lightbox="./media/enable-storage-network-security/change-access-mode.png" alt-text="A screenshot showing how to change the access mode of a storage account associated with a Network Security Perimeter in the Azure portal.":::
165
+
:::image type="content" source="./media/enable-storage-network-security/change-access-mode.png" lightbox="./media/enable-storage-network-security/change-access-mode.png" alt-text="A screenshot showing how to change the access mode of a storage account associated with a Network Security Perimeter in the Azure portal.":::
169
166
170
167
### Post-enforcement validation
171
168
172
-
Following enforcement, monitor the environment closely for any blocked traffic that may indicate misconfigurations. You can validate the Event Grid configuration isn't impacted by the new network settings by reviewing the Event Grid system topic subscriptions metrics.
169
+
Following enforcement, monitor the environment closely for any blocked traffic that may indicate misconfigurations. Validate the Event Grid configuration isn't impacted by reviewing the Event Grid system topic subscription metrics.
173
170
174
-
Use the diagnostic logs to investigate and resolve any issues that arise. Review the metrics on the storage account and Event Grid to validate for any errors. Roll back to Transition Mode if you experience any disruption and repeat investigation using the diagnostic logs.
171
+
Use the diagnostic logs to investigate and resolve any issues that arise. Review the metrics on the storage account (queue ingress and errors) and Event Grid (delivery success) to validate for any errors. Roll back to Transition Mode if you experience any disruption and repeat investigation using the diagnostic logs.
175
172
176
173
#### Set Secured by Perimeter on the Storage Account (Optional)
177
174
178
-
Setting the storage account to **Secured by Perimeter** ensures that all traffic to the storage account is evaluated against the Network Security Perimeter rules. This adds an additional layer of security by enforcing that all access to the storage account goes through the perimeter.
175
+
Setting the storage account to **Secured by Perimeter** ensures that all traffic to the storage account is evaluated against the Network Security Perimeter rules and blocks public network access.
179
176
180
177
1. Navigate to your **Storage Account**.
181
178
182
179
1. Under **Security + networking**, select **Networking**.
183
180
1. Under **Public network access**, select **Manage**.
184
-
3. Set **Secured by Perimeter (Most restricted)**.
185
-
4. Select **Save**.
181
+
1. Set **Secured by Perimeter (Most restricted)**.
182
+
1. Select **Save**.
186
183
187
184
:::image type="content" source="./media/enable-storage-network-security/set-storage-networking.png" lightbox="./media/enable-storage-network-security/set-storage-networking.png" alt-text="A screenshot showing how to set a storage account to 'Secured by Perimeter' in the Azure portal.":::
188
185
189
186
190
187
## Next steps
191
188
192
-
In this article, you learned how to enable network security on the storage resources integrated with your Azure Storage connector. For more information, see the [Network Security Perimeter](/azure/private-link/network-security-perimeter-concepts) articles.
189
+
In this article, you learned how to enable network security on the storage resources integrated with your Azure Storage connector. For more information, see the [Network Security Perimeter](/azure/private-link/network-security-perimeter-concepts) articles.
190
+
191
+
- Review data-connection rules in [`data-connection-rules-reference-azure-storage.md`](data-connection-rules-reference-azure-storage.md).
192
+
- Troubleshoot connector networking issues in [`azure-storage-blob-connector-troubleshoot.md`](azure-storage-blob-connector-troubleshoot.md).
0 commit comments