You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/compliance-certifications.md
+20-6Lines changed: 20 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,39 @@
1
1
---
2
2
title: Azure Firewall certifications
3
-
description: A list of Azure Firewall certifications for PCI, SOC, and ISO.
4
-
services: firewall
3
+
description: Learn about Azure Firewall compliance certifications including CSA STAR, ISO, SOC, PCI DSS, HITRUST, FedRAMP, and DoD across global and industry-specific audit programs.
5
4
author: duongau
6
5
ms.service: azure-firewall
7
6
ms.topic: concept-article
8
-
ms.date: 04/28/2023
7
+
ms.date: 03/28/2026
9
8
ms.author: duau
10
9
# Customer intent: "As a compliance officer in a regulated industry, I want to review the certifications of Azure Firewall, so that I can ensure it meets the necessary regulatory requirements for our organization."
11
10
---
12
11
13
12
# Azure Firewall certifications
14
13
15
-
To help you meet your own compliance obligations across regulated industries and markets worldwide, Azure maintains the largest compliance portfolio in the industry both in terms of breadth (total number of offerings) and depth (number of [customer-facing services](https://azure.microsoft.com/services/) in assessment scope).
14
+
To help you meet your own compliance obligations across regulated industries and markets worldwide, Azure maintains the largest compliance portfolio in the industry both in terms of breadth (total number of offerings) and depth (number of [customer-facing services](https://azure.microsoft.com/services/) in assessment scope).
16
15
For service availability, see [Products available by region](https://azure.microsoft.com/global-infrastructure/services/).
17
16
18
17
## Azure Firewall audit scope
19
18
20
-
Microsoft retains independent, third-party auditing firms to conduct audits of Microsoft cloud services. The resulting compliance assurances are applicable to both Azure and Azure Government cloud environments. Compliance offerings are grouped into four segments: globally applicable, US government, industry specific, and region/country specific. Azure compliance certificates and audit reports state clearly which cloud services are in scope for independent third-party audits. Different audits may have different cloud services in audit scope.
19
+
Microsoft retains independent, third-party auditing firms to conduct audits of Microsoft cloud services. The resulting compliance assurances apply to both Azure and Azure Government cloud environments. Compliance offerings are grouped into four segments: globally applicable, US government, industry specific, and region or country/region specific. Azure compliance certificates and audit reports clearly state which cloud services are in scope for independent third-party audits. Different audits might have different cloud services in audit scope.
21
20
22
-
Azure Firewall is included in many Azure compliance audits such as CSA STAR, ISO, SOC, PCI DSS, HITRUST, FedRAMP, DoD, and others. For the latest insight into Azure Firewall compliance audit scope, see [Cloud services in audit scope](/azure/compliance/offerings/cloud-services-in-audit-scope).
21
+
Azure Firewall is included in many Azure compliance audits. The following list shows the key certifications by category:
22
+
23
+
**Global, industry, and regional:**
24
+
- CSA STAR
25
+
- ISO/IEC 27001, 27017, and 27018
26
+
- SOC 1 Type 2, SOC 2 Type 2, and SOC 3
27
+
- PCI DSS Level 1
28
+
- HIPAA BAA
29
+
- HITRUST CSF
30
+
- GSMA
31
+
32
+
**US government:**
33
+
- FedRAMP High
34
+
- DoD IL2, IL4, IL5, and IL6 (Azure Government)
35
+
36
+
For the authoritative and up-to-date list of which Azure services are in each audit scope, see [Cloud services in audit scope](/azure/compliance/offerings/cloud-services-in-audit-scope).
description: Learn about Azure Firewall's Explicit Proxy setting.
4
-
services: firewall
5
-
author: duau
2
+
title: Azure Firewall explicit proxy (preview)
3
+
description: Learn about Azure Firewall's explicit proxy setting.
4
+
author: duongau
6
5
ms.service: azure-firewall
7
6
ms.topic: concept-article
8
-
ms.date: 03/30/2023
9
-
ms.author: magakman
7
+
ms.date: 03/28/2026
8
+
ms.author: duau
10
9
ms.custom: sfi-image-nochange
11
10
# Customer intent: As a network administrator, I want to configure an explicit proxy on Azure Firewall, so that I can manage outbound traffic efficiently without using a user-defined route.
12
11
---
13
12
14
-
# Azure Firewall Explicit proxy (preview)
13
+
# Azure Firewall explicit proxy (preview)
15
14
16
15
> [!IMPORTANT]
17
16
> Explicit proxy is currently in PREVIEW.
18
17
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19
18
20
-
Azure Firewall operates in a transparent proxy mode by default. In this mode, traffic is sent to the firewall using a userdefined route (UDR) configuration. The firewall intercepts that traffic inline and passes it to the destination.
19
+
Azure Firewall operates in a transparent proxy mode by default. In this mode, you use a user-defined route (UDR) configuration to send traffic to the firewall. The firewall intercepts that traffic inline and passes it to the destination.
21
20
22
-
With Explicit proxy set on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without the using a UDR.
21
+
When you set up explicit proxy on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without using a UDR.
23
22
24
-
With the Explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
23
+
With the explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
25
24
26
25
## Configuration
27
26
28
-
-Once the feature is enabled, the following screen shows on the portal:
27
+
-After you enable the feature, the following screen appears on the portal:
29
28
30
29
:::image type="content" source="media/explicit-proxy/enable-explicit-proxy.png" alt-text="Screenshot showing the Enable explicit proxy setting.":::
31
30
32
31
> [!NOTE]
33
32
> The HTTP and HTTPS ports can't be the same.
34
33
35
-
- Next, to allow the traffic to pass through the Firewall, create an **application** rule in the Firewall policy to allow this traffic.
36
-
> [!IMPORTANT]
37
-
> You must use an application rule. A network rule won't work.
34
+
1. Next, to allow the traffic through the firewall, create an **application** rule in the firewall policy to allow this traffic.
38
35
36
+
> [!IMPORTANT]
37
+
> You must use an application rule. A network rule doesn't work.
39
38
40
-
-To use the Proxy autoconfiguration (PAC) file, select **Enable proxy auto-configuration**.
39
+
-Select **Enable proxy auto-configuration** to use the Proxy autoconfiguration (PAC) file.
41
40
42
-
- First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy**page, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
41
+
1. First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy**pane, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
43
42
44
-
The SAS URL must have READ permissions so the firewall can download the file. If changes are made to the PAC file, a new SAS URL needs to be generated and configured on the firewall **Enable explicit proxy** page.
43
+
The SAS URL must have **READ** permissions so the firewall can download the file. If you make changes to the PAC file, you need to generate a new SAS URL and configure it on the firewall **Enable explicit proxy** page.
To ensure consistent configuration of explicit proxy settings across your Azure Firewall deployments, you can use Azure Policy definitions. The following policies are available to govern explicit proxy configurations:
49
+
To ensure consistent configuration of explicit proxy settings across your Azure Firewall deployments, use Azure Policy definitions. The following policies are available to govern explicit proxy configurations:
51
50
52
51
-**Enforce Explicit Proxy Configuration for Firewall Policies**: Ensures that all Azure Firewall policies have explicit proxy configuration enabled.
53
52
-**Enable PAC file configuration while using Explicit Proxy**: Audits that when explicit proxy is enabled, the PAC (Proxy Auto-Configuration) file is also properly configured.
@@ -56,5 +55,5 @@ For more information about these policies and how to implement them, see [Use Az
56
55
57
56
## Next steps
58
57
59
-
- To learn more about Explicit proxy, see [Demystifying Explicit proxy: Enhancing Security with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/demystifying-explicit-proxy-enhancing-security-with-azure/ba-p/3873445).
60
-
- To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall using Azure PowerShell](deploy-ps.md).
58
+
- To learn more about explicit proxy, see [Demystifying Explicit proxy: Enhancing Security with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/demystifying-explicit-proxy-enhancing-security-with-azure/ba-p/3873445).
59
+
- To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall by using Azure PowerShell](deploy-ps.md).
Copy file name to clipboardExpand all lines: articles/firewall/firewall-best-practices.md
+16-17Lines changed: 16 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,10 @@
1
1
---
2
2
title: Azure Firewall best practices for performance
3
-
description: Learn how to configure Azure Firewall to maximize performance
4
-
services: firewall
3
+
description: Learn how to configure Azure Firewall to maximize performance and minimize latency using best practices for rules, SNAT, IDPS, and monitoring.
5
4
author: duongau
6
5
ms.service: azure-firewall
7
6
ms.topic: concept-article
8
-
ms.date: 01/13/2025
7
+
ms.date: 03/28/2026
9
8
ms.author: duau
10
9
# Customer intent: As a network administrator, I want to implement best practices for Azure Firewall configuration, so that I can optimize its performance and ensure efficient network traffic management while maintaining security.
11
10
---
@@ -14,39 +13,39 @@ ms.author: duau
14
13
15
14
To maximize the [performance](firewall-performance.md) of your Azure Firewall and Firewall policy, it’s important to follow best practices. However, certain network behaviors or features can affect the firewall’s performance and latency, despite its performance optimization capabilities.
16
15
17
-
## Performance issues common causes
16
+
## Common causes of performance problems
18
17
19
18
-**Exceeding rule limitations**
20
19
21
-
If you exceed limitations, such as using over 20,000 unique source/destination combinations in rules, it can affect firewall traffic processing and cause latency. Even though this is a soft limit, if you surpass this value it can affect overall firewall performance. For more information, see the [documented limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
20
+
If you exceed limitations, such as using more than 20,000 unique source or destination combinations in rules, you can affect firewall traffic processing and cause latency. Even though this limit is soft, surpassing it can affect overall firewall performance. For more information, see the [documented limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
22
21
23
22
-**High traffic throughput**
24
23
25
-
Azure Firewall Standard supports up to 30 Gbps, while Premium supports up to 100 Gbps. For more information, see the [throughput limitations](firewall-performance.md#performance-data). You can monitor your throughput or data processing in Azure Firewall metrics. For more information, see [Azure Firewall metrics and alerts](metrics.md).
24
+
Azure Firewall Standard supports up to 30 Gbps, while Premium supports up to 100 Gbps. For more information, see the [throughput limitations](firewall-performance.md#performance-data). You can monitor your throughput or data processing in Azure Firewall metrics. For more information, see [Azure Firewall metrics and alerts](monitor-firewall-reference.md).
26
25
27
-
-**High Number of Connections**
26
+
-**High number of connections**
28
27
29
28
An excessive number of connections passing through the firewall can lead to SNAT (Source Network Address Translation) port exhaustion.
30
29
31
-
-**IDPS Alert + Deny Mode**
30
+
-**IDPS Alert + Deny mode**
32
31
33
-
If you enable IDPS Alert + Deny Mode, the firewall drops packets that match an IDPS signature. This affects performance.
32
+
If you enable IDPS Alert + Deny mode, the firewall drops packets that match an IDPS signature. This action affects performance.
34
33
35
34
## Recommendations
36
35
37
36
-**Optimize rule configuration and processing**
38
37
39
-
- Organize rules using firewall policy into Rule Collection Groups and Rule Collections, prioritizing them based on their use frequency.
38
+
- Organize rules by using firewall policy into Rule Collection Groups and Rule Collections, and prioritize them based on how often they're used.
40
39
- Use [IP Groups](ip-groups.md) or IP prefixes to reduce the number of IP table rules.
41
40
- Prioritize rules with the highest number of hits.
42
-
-Ensure that you are within the following [rule limitations](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
41
+
-Make sure you're within the following [rule limitations](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
43
42
-**Use or migrate to Azure Firewall Premium**
44
43
- Azure Firewall Premium uses advanced hardware and offers a higher-performing underlying engine.
45
-
-Best for heavier workloads and higher traffic volumes.
44
+
-It's best for heavier workloads and higher traffic volumes.
46
45
- It also includes built-in accelerated networking software, which can achieve throughput of up to 100 Gbps, unlike the Standard version.
47
46
-**Add multiple public IP addresses to the firewall to prevent SNAT port exhaustion**
48
-
- To prevent SNAT port exhaustion, consider adding multiple public IP addresses (PIPs) to your firewall. Azure Firewall provides [2,496 SNAT ports per each additional PIP](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
49
-
- If you prefer not to add more PIPs, you can add an Azure NAT Gateway to scale SNAT port usage. This provides advanced SNAT port allocation capabilities.
47
+
- To prevent SNAT port exhaustion, consider adding multiple public IP addresses (PIPs) to your firewall. Azure Firewall provides [2,496 SNAT ports per each additional PIP](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
48
+
- If you prefer not to add more PIPs, you can add an Azure NAT Gateway to scale SNAT port usage. This solution provides advanced SNAT port allocation capabilities.
50
49
-**Start with IDPS Alert mode before you enable Alert + Deny mode**
51
50
- While the *Alert + Deny* mode offers enhanced security by blocking suspicious traffic, it can also introduce more processing overhead. If you disable this mode, you might observe performance improvement, especially in scenarios where the firewall is primarily used for routing and not deep packet inspection.
52
51
- It's essential to remember that traffic through the firewall is denied by default until you explicitly configure *allow* rules. Therefore, even when IDPS *Alert + Deny* mode is disabled, your network remains protected, and only explicitly permitted traffic is allowed to pass through the firewall. It can be a strategic choice to disable this mode to optimize performance without compromising the core security features provided by the Azure Firewall.
@@ -56,7 +55,7 @@ To maximize the [performance](firewall-performance.md) of your Azure Firewall an
56
55
57
56
## Testing and monitoring
58
57
59
-
To ensure optimal performance for your Azure Firewall, you should continuously and proactively monitor it. It's crucial to regularly assess the health and key metrics of your firewall to identify potential issues and maintain efficient operation, especially during configuration changes.
58
+
To ensure optimal performance for your Azure Firewall, continuously and proactively monitor it. Regularly assess the health and key metrics of your firewall to identify potential issues and maintain efficient operation, especially during configuration changes.
60
59
61
60
Use the following best practices for testing and monitoring:
62
61
@@ -65,13 +64,13 @@ Use the following best practices for testing and monitoring:
65
64
-**Measure firewall latency using latency probe metrics**
66
65
- Use the *latency probe* metric to measure the average latency of the Azure Firewall. This metric provides an indirect metric of the firewall’s performance. Remember that intermittent latency spikes are normal.
67
66
-**Measure traffic throughput metric**
68
-
- Monitor the *traffic throughput* metric to understand how much data passes through the firewall. This helps you gauge the firewall’s capacity and its ability to handle the network traffic.
67
+
- Monitor the *traffic throughput* metric to understand how much data passes through the firewall. This metric helps you gauge the firewall's capacity and its ability to handle the network traffic.
69
68
-**Measure data processed**
70
69
- Keep track of the *data processed* metric to assess the volume of data processed by the firewall.
71
70
-**Identify rule hits and performance spikes**
72
71
- Look for spikes in network performance or latency. Correlate rule hit timestamps, such as application rules hit count and network rules hit count, to determine if rule processing is a significant factor contributing to performance or latency issues. By analyzing these patterns, you can identify specific rules or configurations that you might need to optimize.
73
72
-**Add alerts to key metrics**
74
-
- In addition to regular monitoring, it's crucial to set up alerts for key firewall metrics. This ensures that you're promptly notified when specific metrics surpass predefined thresholds. To configure alerts, see [Azure Firewall logs and metrics](metrics.md#alert-on-azure-firewall-metrics) for detailed instructions about setting up effective alerting mechanisms. Proactive alerting enhances your ability to respond swiftly to potential issues and maintain optimal firewall performance.
73
+
- In addition to regular monitoring, set up alerts for key firewall metrics. This step ensures that you're promptly notified when specific metrics surpass predefined thresholds. To configure alerts, see [Azure Firewall logs and metrics](monitor-firewall.md#alert-on-azure-firewall-metrics) for detailed instructions about setting up effective alerting mechanisms. Proactive alerting enhances your ability to respond swiftly to potential issues and maintain optimal firewall performance.
75
74
-**Implement governance and compliance**
76
75
- Use [Azure Policy](firewall-azure-policy.md) to enforce consistent configuration standards across your Azure Firewall deployments, including explicit proxy settings and other security configurations.
77
76
- Track configuration changes using [Azure Resource Graph](rule-set-change-tracking.md) to maintain compliance and operational visibility.
0 commit comments