You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/firewall-copilot.md
+35-35Lines changed: 35 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Azure Firewall integration in Microsoft Security Copilot
3
3
description: Learn about using Microsoft Security Copilot to investigate traffic flagged by Azure Firewall with Intrusion Detection and Prevention System (IDPS).
4
4
keywords: security copilot, copilot for security, threat intelligence, IDPS, intrusion detection and prevention system, plugin, integration, azure firewall, firewall copilot, open ai, openai, co-pilot
# Azure Firewall integration in Microsoft Security Copilot
19
19
20
-
Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of security personnel to improve security outcomes at machine speed and scale. It provides a natural language, assistive copilot experience helping support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management. For more information about what it can do, see [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot)
20
+
Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of security personnel to improve security outcomes at machine speed and scale. It provides a natural language, assistive copilot experience that helps support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management. For more information about what it can do, see [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot)
21
21
22
22
## Know before you begin
23
23
24
-
If you're new to Security Copilot, you should familiarize yourself with it by reading these articles:
24
+
If you're new to Security Copilot, familiarize yourself with it by reading these articles:
25
25
-[What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot)
-[Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot)
@@ -30,57 +30,57 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
30
30
31
31
## Security Copilot integration in Azure Firewall
32
32
33
-
Azure Firewall is a cloud-native and intelligent network firewall security service that provides best of breed threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
33
+
Azure Firewall is a cloud-native and intelligent network firewall security service that provides best-in-class threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
34
34
35
-
The Azure Firewall integration in Security Copilot helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS feature of their firewalls across their entire fleet using natural language questions.
35
+
The Azure Firewall integration in Security Copilot helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS feature of their firewalls across their entire fleet by using natural language questions.
36
36
37
-
You can use this integration in two different experience:
37
+
You can use this integration in two different experiences:
:::image type="content" source="media/firewall-copilot/security-copilot-overview.png" alt-text="Screenshot of the Security Copilot portal with a prompt relevant to Firewall." lightbox="media/firewall-copilot/security-copilot-overview.png":::
42
42
43
43
-[Azure Copilot](/azure/copilot/overview) (embedded experience) in the Azure portal:
44
44
45
-
:::image type="content" source="media/firewall-copilot/azure-copilot-overview-image.png" alt-text="Screenshot of the Azure portal with a prompt relevant to Firewall." lightbox="media/firewall-copilot/azure-copilot-overview-image.png":::
45
+
:::image type="content" source="media/firewall-copilot/azure-copilot-overview-image.png" alt-text="Screenshot of the Azure portal with a prompt relevant to Firewall." lightbox="media/firewall-copilot/azure-copilot-overview-image.png":::
46
46
47
-
For more information, see [Microsoft Security Copilot experiences](/security-copilot/experiences-security-copilot) and [Azure Copilot capabilities](/azure/copilot/capabilities).
47
+
For more information, see [Microsoft Security Copilot experiences](/security-copilot/experiences-security-copilot) and [Azure Copilot capabilities](/azure/copilot/capabilities).
48
48
49
49
## Key features
50
50
51
-
Security Copilot has built-in system features that can get data from the different plugins that are turned on.
51
+
Security Copilot has built-in system features that get data from the different plugins that are turned on.
52
52
53
53
To view the list of built-in system capabilities for Azure Firewall, use the following procedure on the Security Copilot portal:
54
54
55
55
1. In the prompt bar, select the **Prompts** icon.
56
56
57
-
2. Select **See all system capabilities**.
57
+
2. Select **See all system capabilities**.
58
58
59
59
3. The **Azure Firewall** section lists all the available capabilities that you can use.
60
60
61
61
## Enable the Azure Firewall integration in Security Copilot
62
62
63
-
1.Ensure your Azure Firewall is configured correctly:
64
-
65
-
-[Azure Firewall Structured Logs](firewall-structured-logs.md#resource-specific-mode) – the Azure Firewalls to be used with Security Copilot must be configured with resource specific structured logs for IDPS and these logs must be sent to a Log Analytics workspace.
66
-
63
+
1. Ensure your Azure Firewall is configured correctly:
64
+
65
+
-[Azure Firewall Structured Logs](monitor-firewall.md#resource-specific-mode) – to use Azure Firewalls with Security Copilot, configure them with resource specific structured logs for IDPS and send these logs to a Log Analytics workspace.
66
+
67
67
-[Role Based Access Control for Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/role-based-access-control-for-azure-firewall/ba-p/2245598) – the users using the Azure Firewall plugin in Security Copilot must have the appropriate Azure Role-based access control roles to access the Firewall and associated Log Analytics workspaces.
68
-
68
+
69
69
1. Go to [Security Copilot](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
70
70
71
-
1. Ensure that the Azure Firewall plugin is turned on. In the prompt bar, select the **Sources** icon. In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on. Then, close the window. No other configuration is necessary. As long as structured logs are being sent to a Log Analytics workspace and you have the right Role-based access control permissions, Copilot finds the data it needs to answer your questions.
71
+
1. Make sure that the Azure Firewall plugin is turned on. In the prompt bar, select the **Sources** icon. In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on. Then, close the window. No other configuration is necessary. As long as structured logs are sent to a Log Analytics workspace and you have the right Role-based access control permissions, Copilot finds the data it needs to answer your questions.
72
72
73
-
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin.":::
73
+
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin." lightbox="media/firewall-copilot/azure-firewall-plugin.png":::
74
74
75
75
1. Enter your prompt in the prompt bar on either the [Security Copilot portal](https://securitycopilot.microsoft.com) or via the [Azure Copilot](/azure/copilot/overview) experience in the Azure portal.
76
76
77
77
> [!IMPORTANT]
78
78
> Use of Azure Copilot to query Azure Firewall is included with Security Copilot and requires [security compute units (SCUs)](/security-copilot/get-started-security-copilot#security-compute-units). You can deploy SCUs and increase or decrease them at any time. For more information on SCUs, see [Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot).
79
-
> If you don't have Security Copilot properly configured but ask a question relevant to the Azure Firewall capabilities through the Azure Copilot experience then you'll see an error message.
80
-
79
+
> If you don't have Security Copilot properly configured but ask a question relevant to the Azure Firewall capabilities through the Azure Copilot experience, you see an error message.
80
+
81
81
## Sample Azure Firewall prompts
82
82
83
-
There are many prompts you can use to get information from Azure Firewall. This section lists the ones that work best today. They're continuously updated as new capabilities are launched.
83
+
To get information from Azure Firewall, use prompts. This section lists the ones that work best today. It's continuously updated as new capabilities are launched.
84
84
85
85
### Retrieve the top IDPS signature hits for a given Azure Firewall
86
86
@@ -90,38 +90,38 @@ Get **log information** about the traffic intercepted by the IDPS feature instea
90
90
91
91
**Sample prompts**:
92
92
93
-
- Has there been any malicious traffic intercepted by my Firewall `<Firewall name>`?
93
+
- Has my Firewall `<Firewall name>` intercepted any malicious traffic?
94
94
- What are the top 20 IDPS hits from the last seven days for Firewall `<Firewall name>` in resource group `<resource group name>`?
95
95
- Show me in tabular form the top 50 attacks that targeted Firewall `<Firewall name>` in subscription `<subscription name>` in the past month.
96
96
97
97
### Enrich the threat profile of an IDPS signature beyond log information
98
98
99
-
Get **additional details** to enrich the threat information/profile of an IDPS signature instead of compiling it yourself manually.
99
+
Get **additional details** to enrich the threat information and profile of an IDPS signature instead of compiling it yourself manually.
100
100
101
101
:::image type="content" source="media/firewall-copilot/threat-profile.png" alt-text="Screenshot showing the capability to enrich the threat profile of an IDPS signature beyond log information." lightbox="media/firewall-copilot/threat-profile-expanded.png":::
102
102
103
103
**Sample prompts**:
104
104
105
105
- Explain why IDPS flagged the top hit as high severity and the fifth hit as low severity.
106
106
- What can you tell me about this attack? What are the other attacks this attacker is known for?
107
-
- I see that the third signature ID is associated with CVE `<CVE number\>`, tell me more about this CVE.
107
+
- I see that the third signature ID is associated with CVE `<CVE number\>`. Tell me more about this CVE.
108
108
109
109
> [!NOTE]
110
110
> The Microsoft Threat Intelligence plugin is another source that Security Copilot might use to provide threat intelligence for IDPS signatures.
111
111
112
112
### Look for a given IDPS signature across your tenant, subscriptions, or resource groups
113
113
114
-
Perform a **fleet-wide search** (over any scope) for a threat across all your Firewalls instead of searching for the threat manually.
114
+
Perform a **fleet-wide search** (over any scope) for a threat across all your firewalls instead of searching for the threat manually.
115
115
116
116
:::image type="content" source="media/firewall-copilot/search-tenant-subscription.png" alt-text="Screenshot showing the capability to search for a given IDPS signature across your tenant, subscriptions, or resource groups." lightbox="media/firewall-copilot/search-tenant-subscription-expanded.png":::
117
117
118
118
**Sample prompts**:
119
119
120
-
- Was signature ID `<ID number\>` only stopped by this one Firewall? What about others across this entire tenant?
121
-
- Was the top hit seen by any other Firewall in the subscription `<subscription name>`?
122
-
- Over the past week did any Firewall in resource group `<resource group name\>` see signature ID `<ID number>`?
120
+
- Was signature ID `<ID number\>` only stopped by this one firewall? What about others across this entire tenant?
121
+
- Was the top hit seen by any other firewall in the subscription `<subscription name>`?
122
+
- Over the past week did any firewall in resource group `<resource group name\>` see signature ID `<ID number>`?
123
123
124
-
### Generate recommendations to secure your environment using Azure Firewall's IDPS feature
124
+
### Generate recommendations to secure your environment by using Azure Firewall's IDPS feature
125
125
126
126
Get **information from documentation** about using Azure Firewall's IDPS feature to secure your environment instead of having to look up this information manually.
127
127
@@ -134,18 +134,18 @@ Get **information from documentation** about using Azure Firewall's IDPS feature
134
134
- What is the difference in risk between alert only and alert and block modes for IDPS?
135
135
136
136
> [!NOTE]
137
-
> Security Copilot may also use the _Ask Microsoft Documentation_ capability to provide this information and when using this capability via the Azure Copilot experience, the _Get Information_ capability may be used to provide this information.
137
+
> Security Copilot might also use the _Ask Microsoft Documentation_ capability to provide this information and when using this capability via the Azure Copilot experience, the _Get Information_ capability might be used to provide this information.
138
138
139
139
## Provide feedback
140
140
141
-
Your feedback is vital to guide the current and planned development of the product. The best way to provide this feedback is directly in the product.
141
+
Your feedback is vital to guide the current and planned development of the product. The best way to provide this feedback is directly in the product.
142
142
143
143
### Through Security Copilot
144
144
145
145
Select **How’s this response?** at the bottom of each completed prompt and choose any of the following options:
146
146
147
-
-**Looks right** - Select if the results are accurate, based on your assessment.
148
-
-**Needs improvement** - Select if any detail in the results is incorrect or incomplete, based on your assessment.
147
+
-**Looks right** - Select if the results are accurate, based on your assessment.
148
+
-**Needs improvement** - Select if any detail in the results is incorrect or incomplete, based on your assessment.
149
149
-**Inappropriate** - Select if the results contain questionable, ambiguous, or potentially harmful information.
150
150
151
151
For each feedback option, you can provide additional information in the subsequent dialog box. Whenever possible, and especially when the result is **Needs improvement**, write a few words explaining how the outcome can be improved. If you entered prompts specific to Azure Firewall and the results aren't related, include that information.
Copy file name to clipboardExpand all lines: articles/firewall/integrate-lb.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,11 @@
1
1
---
2
2
title: Integrate Azure Firewall with Azure Standard Load Balancer
3
3
description: You can integrate an Azure Firewall into a virtual network with an Azure Standard Load Balancer (either public or internal).
4
-
services: firewall
5
4
author: varunkalyana
5
+
ms.author: duau
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 03/04/2025
9
-
ms.author: duau
8
+
ms.date: 03/28/2026
10
9
ms.custom: sfi-image-nochange
11
10
# Customer intent: As a network engineer, I want to integrate Azure Firewall with an Azure Standard Load Balancer, so that I can optimize traffic routing and enhance security in my virtual network setup.
12
11
---
@@ -15,23 +14,23 @@ ms.custom: sfi-image-nochange
15
14
16
15
You can integrate an Azure Firewall into a virtual network with either a public or internal Azure Standard Load Balancer.
17
16
18
-
The preferred design is to use an internal load balancer with your Azure Firewall, as it simplifies the setup. If you already have a public load balancer deployed and wish to continue using it, be aware of potential asymmetric routing issues that could disrupt functionality.
17
+
The preferred design is to use an internal load balancer with your Azure Firewall, as it simplifies the setup. If you already have a public load balancer deployed and want to continue using it, be aware of potential asymmetric routing problems that could disrupt functionality.
19
18
20
19
For more information about Azure Load Balancer, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md)
21
20
22
21
## Public load balancer
23
22
24
-
With a public load balancer, the load balancer is deployed with a public frontend IP address.
23
+
When you use a public load balancer, you deploy the load balancer with a public frontend IP address.
25
24
26
25
### Asymmetric routing
27
26
28
-
Asymmetric routing is where a packet takes one path to the destination and takes another path when returning to the source. This issue occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall isn't aware of such an established session.
27
+
Asymmetric routing occurs when a packet takes one path to the destination and takes another path when returning to the source. This problem occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic comes through its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall isn't aware of such an established session.
29
28
30
29
### Fix the routing issue
31
30
32
31
#### Scenario 1: Azure Firewall without NAT Gateway
33
-
When deploying an Azure Firewall into a subnet, you need to create a default route for the subnet. This route directs packets through the firewall's private IP address located on the AzureFirewallSubnet. For detailed steps, see [Deploy and configure Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md#create-a-default-route).
34
-
When integrating the firewall into your load balancer scenario, ensure that your Internet traffic enters through the firewall's public IP address. The firewall applies its rules and NAT the packets to the load balancer's public IP address. The issue arises when packets arrive at the firewall's public IP address but return via the private IP address (using the default route).
32
+
When you deploy an Azure Firewall into a subnet, you need to create a default route for the subnet. This route directs packets through the firewall's private IP address located on the AzureFirewallSubnet. For detailed steps, see [Deploy and configure Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md#create-a-default-route).
33
+
When you integrate the firewall into your load balancer scenario, ensure that your Internet traffic enters through the firewall's public IP address. The firewall applies its rules and NATs the packets to the load balancer's public IP address. The problem arises when packets arrive at the firewall's public IP address but return via the private IP address (using the default route).
35
34
36
35
To prevent asymmetric routing, add a specific route for the firewall's public IP address. Packets intended for the firewall's public IP address are directed through the Internet, bypassing the default route to the firewall's private IP address.
0 commit comments