Skip to content

Commit b512d38

Browse files
committed
fix enable NSP
1 parent d1c5a9c commit b512d38

2 files changed

Lines changed: 42 additions & 34 deletions

File tree

articles/sentinel/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -752,6 +752,8 @@
752752
href: cisco-ftd-firewall.md
753753
- name: Google Cloud Platform connectors
754754
href: connect-google-cloud-platform.md
755+
- name: Azure Storage Blob connector
756+
href: setup-azure-storage-connector.md
755757
- name: Microsoft Entra
756758
href: connect-azure-active-directory.md
757759
- name: Azure Stack VMs
@@ -1021,6 +1023,12 @@
10211023
href: data-connector-connection-rules-reference.md
10221024
- name: GCP data connectors API reference
10231025
href: data-connection-rules-reference-gcp.md
1026+
- name: Azure Storage Blob data connector reference
1027+
href: data-connection-rules-reference-azure-storage.md
1028+
- name: Troubleshoot Azure Storage Blob connector issues
1029+
href: azure-storage-blob-connector-troubleshoot.md
1030+
- name: AWS data connectors API reference
1031+
href: data-connection-rules-reference-aws.md
10241032
- name: Sample API requests for creating Data Collection Rules (DCRs)
10251033
href: api-dcr-reference.md
10261034
- name: Microsoft Purview Information Protection reference

articles/sentinel/enable-storage-network-security.md

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,31 @@ description: Learn how to enable network security for Azure Storage connector re
44
author: EdB-MSFT
55
ms.author: edbaynash
66
ms.reviewer: edbaynash
7-
ms.date: 02/05/2026
7+
ms.date: 02/08/2026
88
ms.topic: how-to
99
ms.service: microsoft-sentinel
10-
1110
#customer intent: As a security engineer, I want to configure a Network Security Perimeter for storage accounts used in storage blob connectors
12-
1311
---
1412

1513
# Enable network security on connector integrated storage resources
1614

17-
This article provides step-by-step instructions on how to enable network security on the storage resources integrated with your Azure Storage connector. Azure network security perimeter (NSP) is an Azure-native feature that creates a logical isolation boundary for your PaaS resources. By associating resources like storage accounts or databases with an NSP, you can centrally manage network access using a simplified rule set – reference network security perimeters documentation (/azure/private-link/network-security-perimeter-concepts).
15+
This article provides step-by-step instructions on how to enable network security on the storage resources integrated with your Azure Storage connector. Azure network security perimeter (NSP) is an Azure-native feature that creates a logical isolation boundary for your PaaS resources. By associating resources like storage accounts or databases with an NSP, you can centrally manage network access using a simplified rule set. For more information, see [Network security perimeter concepts](/azure/private-link/network-security-perimeter-concepts).
1816

1917

2018
## Prerequisites
2119

22-
Before Enable network security you must create your connector resources. See [Set up your Azure Storage Connector to stream logs to Microsoft Sentinel](setup-azure-storage-connector.md) including an Event Grid System Topic used to stream blob creation events to the Azure Storage queue.
20+
Before enabling network security, create your connector resources. See [Set up your Azure Storage Connector to stream logs to Microsoft Sentinel](setup-azure-storage-connector.md), including the Event Grid system topic used to stream blob creation events to the Azure Storage queue.
2321

2422
To complete this setup, ensure you have the following permissions:
2523

26-
- Subscription-level Owner or Contributor to create Security Perimeter resources.
27-
- Storage Account Contributor to associate the storage account with the NSP.
28-
- Storage Account User Access Administrator or Owner to assign RBAC roles to the Event Grid managed identity.
29-
- Event Grid Contributor to enable managed identity and manage event subscriptions.
24+
- Subscription Owner or Contributor to create network security perimeter resources.
25+
- Storage Account Contributor to associate the storage account with the NSP.
26+
- Storage Account User Access Administrator or Owner to assign RBAC roles to the Event Grid managed identity.
27+
- Event Grid Contributor to enable managed identity and manage event subscriptions.
3028

3129
## Enable Network Security
3230

33-
To enable network security on the storage resources integrated with your Azure Storage connector, you need to create a Network Security Perimeter (NSP) and associate the storage account with it. Then configure the necessary rules to allow traffic from Event Grid and other relevant sources while blocking unauthorized access. Use the following steps to complete the configuration.
31+
To enable network security on the storage resources integrated with your Azure Storage connector, create a Network Security Perimeter (NSP), associate the storage account with it, and configure the rules to allow traffic from Event Grid and other required sources while blocking unauthorized access. Use the following steps to complete the configuration.
3432

3533
### Create a Network Security Perimeter
3634
1. In the Azure portal, search for *Network Security Perimeters*
@@ -45,13 +43,13 @@ To enable network security on the storage resources integrated with your Azure S
4543
:::image type="content" source="./media/enable-storage-network-security/create-network-security-perimeter.png" lightbox="./media/enable-storage-network-security/create-network-security-perimeter.png" alt-text="A screenshot showing the creation of a Network Security Perimeter in the Azure portal.":::
4644

4745
### Associate the Storage Account with the Network Security Perimeter
48-
1. Open your newly created Network Security Perimeter resource
46+
1. Open your newly created Network Security Perimeter resource in the Azure portal.
4947

5048
1. Select **Profiles**, then select the profile name you used when creating the NSP resource.
5149
1. Select **Associated resources**.
5250
1. Select **Add**.
5351
1. Search for and add your storage account, then select **Select**.
54-
1. Select **Associate**.
52+
1. Select **Associate**.
5553

5654
The access mode is set to **Transition** by default, allowing you to validate the configuration before enforcing restrictions.
5755

@@ -68,8 +66,7 @@ The access mode is set to **Transition** by default, allowing you to validate th
6866
1. Select **Identity**.
6967

7068
1. On the **System assigned** tab, set the **Status** to **On**.
71-
1. Select **Save**.
72-
1. After saving, copy the **Object ID** of the managed identity for later use.
69+
1. Select **Save**, then copy the **Object ID** of the managed identity for later use.
7370

7471
:::image type="content" source="./media/enable-storage-network-security/create-system-assigned-identity.png" lightbox="./media/enable-storage-network-security/create-system-assigned-identity.png" alt-text="A screenshot showing the creation of a managed identity for an Event Grid System Topic in the Azure portal.":::
7572

@@ -80,30 +77,30 @@ The access mode is set to **Transition** by default, allowing you to validate th
8077

8178
1. Select **Access Control (IAM)**.
8279
1. Select **Add**.
83-
1. Search for and select the *Storage Queue Data Message Sender* role.
80+
1. Search for and select the **Storage Queue Data Message Sender** role (scope: the storage account).
8481
1. Select the **Members** tab and then **Select members**.
85-
1. In the **Select members** pane, paste the Object ID for the Event Grid system topic managed identity created in the previous step
86-
1. Select the managed identity and then click **Select**
87-
1. Select **Review + assign** to complete the role assignment
82+
1. In the **Select members** pane, paste the Object ID for the Event Grid system topic managed identity created in the previous step.
83+
1. Select the managed identity and then select **Select**.
84+
1. Select **Review + assign** to complete the role assignment.
8885
:::image type="content" source="./media/enable-storage-network-security/add-role-assignment.png" lightbox="./media/enable-storage-network-security/add-role-assignment.png" alt-text="A screenshot showing the assignment of the Storage Queue Data Message Sender role to a managed identity in the Azure portal.":::
8986

9087

9188
### Enable Managed Identity on the event subscription
9289

9390
1. Open the **Event Grid System Topic**.
9491

95-
1. Select the event subscription targeting the queue.
92+
1. Select the event subscription that targets the queue.
9693
1. Select the **Additional settings** tab.
9794
1. Set **Managed identity type** to **System-assigned**.
9895
1. Select **Save**.
99-
1. Review the Event Grid subscriptions metrics to validate messages are still successfully published to the storage queue after this update.
96+
1. Review the Event Grid subscription metrics to validate messages are successfully published to the storage queue after this update.
10097

10198
:::image type="content" source="./media/enable-storage-network-security/set-additional-features.png" lightbox="./media/enable-storage-network-security/set-additional-features.png" alt-text="A screenshot showing the enabling of managed identity for an Event Grid subscription in the Azure portal.":::
10299

103100

104101
### Configure Inbound Access rules on the Network Security Perimeter profile
105102

106-
The following rules are required to allow Event Grid to deliver messages to the storage account while blocking unauthorized access. Depending on the system sending data to the storage account or accessing the storage resources, you may need to add additional inbound rules. Review your scenario and traffic patterns to safely apply the necessary rules.
103+
The following rules are required to allow Event Grid to deliver messages to the storage account while blocking unauthorized access. Depending on the system sending data to the storage account or accessing the storage resources, you may need to add additional inbound rules. Review your scenario and traffic patterns to safely apply the necessary rules, and allow time for rule propagation.
107104

108105
#### Rule 1: Allow the Subscription (Event Grid Delivery)
109106

@@ -125,7 +122,7 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
125122
:::image type="content" source="./media/enable-storage-network-security/add-inbound-rule.png" lightbox="./media/enable-storage-network-security/add-inbound-rule.png" alt-text="A screenshot showing the creation of an inbound access rule to allow a subscription in the Azure portal.":::
126123

127124
> [!NOTE]
128-
> Rules can take a few of minutes to appear in the list after creation.
125+
> Rules can take a few minutes to appear in the list after creation.
129126
130127

131128
#### Rule 2: Allow Scuba service IP ranges
@@ -135,15 +132,15 @@ Event Grid delivery doesn't originate from fixed public IPs. The NSP validates d
135132

136133
1. Enter a **Rule name**, for example `Allow-Scuba`.
137134
1. Select **IP address ranges** from the **Source type** drop-down.
138-
1. Open the [service tag download](/azure/virtual-network/service-tags-overview#discover-service-tags-by-using-downloadable-json-files) page.
139-
1. Select your cloud, for example **Azure Public** .
135+
1. Open the [service tag download](/azure/virtual-network/service-tags-overview#discover-service-tags-by-using-downloadable-json-files) page.
136+
1. Select your cloud, for example **Azure Public**.
140137
1. Select the **Download** button and open the downloaded file to get the list of IP ranges.
141138
1. Find the `Scuba` service tag and copy the associated IPv4 ranges.
142139
1. Paste the IPv4 ranges into the **Allowed Sources** field after removing any quotes and trailing commas.
143140
1. Select **Add** to create the rule.
144141

145142
> [!IMPORTANT]
146-
> Remove the quotes from the IP ranges and ensure that there's no trailing comma on the last entry before pasting them into the **Allowed Sources** field.
143+
> Remove the quotes from the IP ranges and ensure that there's no trailing comma on the last entry before pasting them into the **Allowed Sources** field. Service tag ranges update over time; refresh regularly to keep rules current.
147144
148145
:::image type="content" source="./media/enable-storage-network-security/scuba-ipv4-addresses.png" lightbox="./media/enable-storage-network-security/scuba-ipv4-addresses.png" alt-text="A screenshot showing a part of the ServiceTags_Public.json file with the Scuba service tag and IPv4 ranges highlighted.":::
149146

@@ -154,39 +151,42 @@ After configuring the rules, monitor the diagnostic logs for the Network Securit
154151

155152
#### Transition mode
156153

157-
Consider enabling network security perimeters diagnostic logs to review collected telemetry to validate communication patterns before enforcement. For more information, see [Diagnostic logs for Network Security Perimeter](/azure/private-link/network-security-perimeter-diagnostic-logs)
154+
Enable Network Security Perimeter diagnostic logs and review collected telemetry to validate communication patterns before enforcement. For more information, see [Diagnostic logs for Network Security Perimeter](/azure/private-link/network-security-perimeter-diagnostic-logs).
158155

159156
#### Apply Enforcement mode
160157

161-
Once validation is successful set the access mode to **Enforced** as follows:
158+
Once validation is successful, set the access mode to **Enforced** as follows:
162159
1. From the Network Security Perimeter page, under **Settings**, select **Associated resources**.
163160

164161
1. Select the storage account.
165162
1. Select **Change access mode**.
166163
1. Select **Enforced** and then **Save**.
167164

168-
:::image type="content" source="./media/enable-storage-network-security/change-access-mode.png" lightbox="./media/enable-storage-network-security/change-access-mode.png" alt-text="A screenshot showing how to change the access mode of a storage account associated with a Network Security Perimeter in the Azure portal." :::
165+
:::image type="content" source="./media/enable-storage-network-security/change-access-mode.png" lightbox="./media/enable-storage-network-security/change-access-mode.png" alt-text="A screenshot showing how to change the access mode of a storage account associated with a Network Security Perimeter in the Azure portal.":::
169166

170167
### Post-enforcement validation
171168

172-
Following enforcement, monitor the environment closely for any blocked traffic that may indicate misconfigurations. You can validate the Event Grid configuration isn't impacted by the new network settings by reviewing the Event Grid system topic subscriptions metrics.
169+
Following enforcement, monitor the environment closely for any blocked traffic that may indicate misconfigurations. Validate the Event Grid configuration isn't impacted by reviewing the Event Grid system topic subscription metrics.
173170

174-
Use the diagnostic logs to investigate and resolve any issues that arise. Review the metrics on the storage account and Event Grid to validate for any errors. Roll back to Transition Mode if you experience any disruption and repeat investigation using the diagnostic logs.
171+
Use the diagnostic logs to investigate and resolve any issues that arise. Review the metrics on the storage account (queue ingress and errors) and Event Grid (delivery success) to validate for any errors. Roll back to Transition Mode if you experience any disruption and repeat investigation using the diagnostic logs.
175172

176173
#### Set Secured by Perimeter on the Storage Account (Optional)
177174

178-
Setting the storage account to **Secured by Perimeter** ensures that all traffic to the storage account is evaluated against the Network Security Perimeter rules. This adds an additional layer of security by enforcing that all access to the storage account goes through the perimeter.
175+
Setting the storage account to **Secured by Perimeter** ensures that all traffic to the storage account is evaluated against the Network Security Perimeter rules and blocks public network access.
179176

180177
1. Navigate to your **Storage Account**.
181178

182179
1. Under **Security + networking**, select **Networking**.
183180
1. Under **Public network access**, select **Manage**.
184-
3. Set **Secured by Perimeter (Most restricted)**.
185-
4. Select **Save**.
181+
1. Set **Secured by Perimeter (Most restricted)**.
182+
1. Select **Save**.
186183

187184
:::image type="content" source="./media/enable-storage-network-security/set-storage-networking.png" lightbox="./media/enable-storage-network-security/set-storage-networking.png" alt-text="A screenshot showing how to set a storage account to 'Secured by Perimeter' in the Azure portal.":::
188185

189186

190187
## Next steps
191188

192-
In this article, you learned how to enable network security on the storage resources integrated with your Azure Storage connector. For more information, see the [Network Security Perimeter](/azure/private-link/network-security-perimeter-concepts) articles.
189+
In this article, you learned how to enable network security on the storage resources integrated with your Azure Storage connector. For more information, see the [Network Security Perimeter](/azure/private-link/network-security-perimeter-concepts) articles.
190+
191+
- Review data-connection rules in [`data-connection-rules-reference-azure-storage.md`](data-connection-rules-reference-azure-storage.md).
192+
- Troubleshoot connector networking issues in [`azure-storage-blob-connector-troubleshoot.md`](azure-storage-blob-connector-troubleshoot.md).

0 commit comments

Comments
 (0)