Skip to content

Commit d98dc9d

Browse files
authored
Merge pull request #313831 from duongau/firewall-freshness-review-564969-P1b
Azure Firewall freshness review — articles #19-27 (P1b)
2 parents 3aa78cf + 8f99f93 commit d98dc9d

9 files changed

Lines changed: 230 additions & 232 deletions

articles/firewall/firewall-copilot.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Azure Firewall integration in Microsoft Security Copilot
33
description: Learn about using Microsoft Security Copilot to investigate traffic flagged by Azure Firewall with Intrusion Detection and Prevention System (IDPS).
44
keywords: security copilot, copilot for security, threat intelligence, IDPS, intrusion detection and prevention system, plugin, integration, azure firewall, firewall copilot, open ai, openai, co-pilot
5-
author: abhinavsriram
5+
author: duongau
66
ms.author: duau
7-
ms.date: 04/25/2025
8-
ms.update-cycle: 180-days
9-
ms.topic: concept-article
107
ms.service: azure-firewall
8+
ms.topic: concept-article
9+
ms.date: 03/28/2026
10+
ms.update-cycle: 180-days
1111
ms.localizationpriority: high
1212
ms.custom:
1313
- ignite-2024
@@ -17,11 +17,11 @@ ms.collection: Tier1, ce-skilling-ai-copilot
1717

1818
# Azure Firewall integration in Microsoft Security Copilot
1919

20-
Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of security personnel to improve security outcomes at machine speed and scale. It provides a natural language, assistive copilot experience helping support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management. For more information about what it can do, see [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot)
20+
Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of security personnel to improve security outcomes at machine speed and scale. It provides a natural language, assistive copilot experience that helps support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management. For more information about what it can do, see [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot)
2121

2222
## Know before you begin
2323

24-
If you're new to Security Copilot, you should familiarize yourself with it by reading these articles:
24+
If you're new to Security Copilot, familiarize yourself with it by reading these articles:
2525
- [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot)
2626
- [Microsoft Security Copilot experiences](/security-copilot/experiences-security-copilot)
2727
- [Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot)
@@ -30,57 +30,57 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
3030

3131
## Security Copilot integration in Azure Firewall
3232

33-
Azure Firewall is a cloud-native and intelligent network firewall security service that provides best of breed threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
33+
Azure Firewall is a cloud-native and intelligent network firewall security service that provides best-in-class threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
3434

35-
The Azure Firewall integration in Security Copilot helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS feature of their firewalls across their entire fleet using natural language questions.
35+
The Azure Firewall integration in Security Copilot helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS feature of their firewalls across their entire fleet by using natural language questions.
3636

37-
You can use this integration in two different experience:
37+
You can use this integration in two different experiences:
3838

3939
- [Security Copilot portal](https://securitycopilot.microsoft.com) (standalone experience)
4040

4141
:::image type="content" source="media/firewall-copilot/security-copilot-overview.png" alt-text="Screenshot of the Security Copilot portal with a prompt relevant to Firewall." lightbox="media/firewall-copilot/security-copilot-overview.png":::
4242

4343
- [Azure Copilot](/azure/copilot/overview) (embedded experience) in the Azure portal:
4444

45-
:::image type="content" source="media/firewall-copilot/azure-copilot-overview-image.png" alt-text="Screenshot of the Azure portal with a prompt relevant to Firewall." lightbox="media/firewall-copilot/azure-copilot-overview-image.png":::
45+
:::image type="content" source="media/firewall-copilot/azure-copilot-overview-image.png" alt-text="Screenshot of the Azure portal with a prompt relevant to Firewall." lightbox="media/firewall-copilot/azure-copilot-overview-image.png":::
4646

47-
For more information, see [Microsoft Security Copilot experiences](/security-copilot/experiences-security-copilot) and [Azure Copilot capabilities](/azure/copilot/capabilities).
47+
For more information, see [Microsoft Security Copilot experiences](/security-copilot/experiences-security-copilot) and [Azure Copilot capabilities](/azure/copilot/capabilities).
4848

4949
## Key features
5050

51-
Security Copilot has built-in system features that can get data from the different plugins that are turned on.
51+
Security Copilot has built-in system features that get data from the different plugins that are turned on.
5252

5353
To view the list of built-in system capabilities for Azure Firewall, use the following procedure on the Security Copilot portal:
5454

5555
1. In the prompt bar, select the **Prompts** icon.
5656

57-
2. Select **See all system capabilities**.
57+
2. Select **See all system capabilities**.
5858

5959
3. The **Azure Firewall** section lists all the available capabilities that you can use.
6060

6161
## Enable the Azure Firewall integration in Security Copilot
6262

63-
1. Ensure your Azure Firewall is configured correctly:
64-
65-
- [Azure Firewall Structured Logs](firewall-structured-logs.md#resource-specific-mode)the Azure Firewalls to be used with Security Copilot must be configured with resource specific structured logs for IDPS and these logs must be sent to a Log Analytics workspace.
66-
63+
1. Ensure your Azure Firewall is configured correctly:
64+
65+
- [Azure Firewall Structured Logs](monitor-firewall.md#resource-specific-mode)to use Azure Firewalls with Security Copilot, configure them with resource specific structured logs for IDPS and send these logs to a Log Analytics workspace.
66+
6767
- [Role Based Access Control for Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/role-based-access-control-for-azure-firewall/ba-p/2245598) – the users using the Azure Firewall plugin in Security Copilot must have the appropriate Azure Role-based access control roles to access the Firewall and associated Log Analytics workspaces.
68-
68+
6969
1. Go to [Security Copilot](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
7070

71-
1. Ensure that the Azure Firewall plugin is turned on. In the prompt bar, select the **Sources** icon. In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on. Then, close the window. No other configuration is necessary. As long as structured logs are being sent to a Log Analytics workspace and you have the right Role-based access control permissions, Copilot finds the data it needs to answer your questions.
71+
1. Make sure that the Azure Firewall plugin is turned on. In the prompt bar, select the **Sources** icon. In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on. Then, close the window. No other configuration is necessary. As long as structured logs are sent to a Log Analytics workspace and you have the right Role-based access control permissions, Copilot finds the data it needs to answer your questions.
7272

73-
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin.":::
73+
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin." lightbox="media/firewall-copilot/azure-firewall-plugin.png":::
7474

7575
1. Enter your prompt in the prompt bar on either the [Security Copilot portal](https://securitycopilot.microsoft.com) or via the [Azure Copilot](/azure/copilot/overview) experience in the Azure portal.
7676

7777
> [!IMPORTANT]
7878
> Use of Azure Copilot to query Azure Firewall is included with Security Copilot and requires [security compute units (SCUs)](/security-copilot/get-started-security-copilot#security-compute-units). You can deploy SCUs and increase or decrease them at any time. For more information on SCUs, see [Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot).
79-
> If you don't have Security Copilot properly configured but ask a question relevant to the Azure Firewall capabilities through the Azure Copilot experience then you'll see an error message.
80-
79+
> If you don't have Security Copilot properly configured but ask a question relevant to the Azure Firewall capabilities through the Azure Copilot experience, you see an error message.
80+
8181
## Sample Azure Firewall prompts
8282

83-
There are many prompts you can use to get information from Azure Firewall. This section lists the ones that work best today. They're continuously updated as new capabilities are launched.
83+
To get information from Azure Firewall, use prompts. This section lists the ones that work best today. It's continuously updated as new capabilities are launched.
8484

8585
### Retrieve the top IDPS signature hits for a given Azure Firewall
8686

@@ -90,38 +90,38 @@ Get **log information** about the traffic intercepted by the IDPS feature instea
9090

9191
**Sample prompts**:
9292

93-
- Has there been any malicious traffic intercepted by my Firewall `<Firewall name>`?
93+
- Has my Firewall `<Firewall name>` intercepted any malicious traffic?
9494
- What are the top 20 IDPS hits from the last seven days for Firewall `<Firewall name>` in resource group `<resource group name>`?
9595
- Show me in tabular form the top 50 attacks that targeted Firewall `<Firewall name>` in subscription `<subscription name>` in the past month.
9696

9797
### Enrich the threat profile of an IDPS signature beyond log information
9898

99-
Get **additional details** to enrich the threat information/profile of an IDPS signature instead of compiling it yourself manually.
99+
Get **additional details** to enrich the threat information and profile of an IDPS signature instead of compiling it yourself manually.
100100

101101
:::image type="content" source="media/firewall-copilot/threat-profile.png" alt-text="Screenshot showing the capability to enrich the threat profile of an IDPS signature beyond log information." lightbox="media/firewall-copilot/threat-profile-expanded.png":::
102102

103103
**Sample prompts**:
104104

105105
- Explain why IDPS flagged the top hit as high severity and the fifth hit as low severity.
106106
- What can you tell me about this attack? What are the other attacks this attacker is known for?
107-
- I see that the third signature ID is associated with CVE `<CVE number\>`, tell me more about this CVE.
107+
- I see that the third signature ID is associated with CVE `<CVE number\>`. Tell me more about this CVE.
108108

109109
> [!NOTE]
110110
> The Microsoft Threat Intelligence plugin is another source that Security Copilot might use to provide threat intelligence for IDPS signatures.
111111
112112
### Look for a given IDPS signature across your tenant, subscriptions, or resource groups
113113

114-
Perform a **fleet-wide search** (over any scope) for a threat across all your Firewalls instead of searching for the threat manually.
114+
Perform a **fleet-wide search** (over any scope) for a threat across all your firewalls instead of searching for the threat manually.
115115

116116
:::image type="content" source="media/firewall-copilot/search-tenant-subscription.png" alt-text="Screenshot showing the capability to search for a given IDPS signature across your tenant, subscriptions, or resource groups." lightbox="media/firewall-copilot/search-tenant-subscription-expanded.png":::
117117

118118
**Sample prompts**:
119119

120-
- Was signature ID `<ID number\>` only stopped by this one Firewall? What about others across this entire tenant?
121-
- Was the top hit seen by any other Firewall in the subscription `<subscription name>`?
122-
- Over the past week did any Firewall in resource group `<resource group name\>` see signature ID `<ID number>`?
120+
- Was signature ID `<ID number\>` only stopped by this one firewall? What about others across this entire tenant?
121+
- Was the top hit seen by any other firewall in the subscription `<subscription name>`?
122+
- Over the past week did any firewall in resource group `<resource group name\>` see signature ID `<ID number>`?
123123

124-
### Generate recommendations to secure your environment using Azure Firewall's IDPS feature
124+
### Generate recommendations to secure your environment by using Azure Firewall's IDPS feature
125125

126126
Get **information from documentation** about using Azure Firewall's IDPS feature to secure your environment instead of having to look up this information manually.
127127

@@ -134,18 +134,18 @@ Get **information from documentation** about using Azure Firewall's IDPS feature
134134
- What is the difference in risk between alert only and alert and block modes for IDPS?
135135

136136
> [!NOTE]
137-
> Security Copilot may also use the _Ask Microsoft Documentation_ capability to provide this information and when using this capability via the Azure Copilot experience, the _Get Information_ capability may be used to provide this information.
137+
> Security Copilot might also use the _Ask Microsoft Documentation_ capability to provide this information and when using this capability via the Azure Copilot experience, the _Get Information_ capability might be used to provide this information.
138138
139139
## Provide feedback
140140

141-
Your feedback is vital to guide the current and planned development of the product. The best way to provide this feedback is directly in the product.
141+
Your feedback is vital to guide the current and planned development of the product. The best way to provide this feedback is directly in the product.
142142

143143
### Through Security Copilot
144144

145145
Select **How’s this response?** at the bottom of each completed prompt and choose any of the following options:
146146

147-
- **Looks right** - Select if the results are accurate, based on your assessment.
148-
- **Needs improvement** - Select if any detail in the results is incorrect or incomplete, based on your assessment.
147+
- **Looks right** - Select if the results are accurate, based on your assessment.
148+
- **Needs improvement** - Select if any detail in the results is incorrect or incomplete, based on your assessment.
149149
- **Inappropriate** - Select if the results contain questionable, ambiguous, or potentially harmful information.
150150

151151
For each feedback option, you can provide additional information in the subsequent dialog box. Whenever possible, and especially when the result is **Needs improvement**, write a few words explaining how the outcome can be improved. If you entered prompts specific to Azure Firewall and the results aren't related, include that information.

articles/firewall/integrate-lb.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,11 @@
11
---
22
title: Integrate Azure Firewall with Azure Standard Load Balancer
33
description: You can integrate an Azure Firewall into a virtual network with an Azure Standard Load Balancer (either public or internal).
4-
services: firewall
54
author: varunkalyana
5+
ms.author: duau
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 03/04/2025
9-
ms.author: duau
8+
ms.date: 03/28/2026
109
ms.custom: sfi-image-nochange
1110
# Customer intent: As a network engineer, I want to integrate Azure Firewall with an Azure Standard Load Balancer, so that I can optimize traffic routing and enhance security in my virtual network setup.
1211
---
@@ -15,23 +14,23 @@ ms.custom: sfi-image-nochange
1514

1615
You can integrate an Azure Firewall into a virtual network with either a public or internal Azure Standard Load Balancer.
1716

18-
The preferred design is to use an internal load balancer with your Azure Firewall, as it simplifies the setup. If you already have a public load balancer deployed and wish to continue using it, be aware of potential asymmetric routing issues that could disrupt functionality.
17+
The preferred design is to use an internal load balancer with your Azure Firewall, as it simplifies the setup. If you already have a public load balancer deployed and want to continue using it, be aware of potential asymmetric routing problems that could disrupt functionality.
1918

2019
For more information about Azure Load Balancer, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md)
2120

2221
## Public load balancer
2322

24-
With a public load balancer, the load balancer is deployed with a public frontend IP address.
23+
When you use a public load balancer, you deploy the load balancer with a public frontend IP address.
2524

2625
### Asymmetric routing
2726

28-
Asymmetric routing is where a packet takes one path to the destination and takes another path when returning to the source. This issue occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall isn't aware of such an established session.
27+
Asymmetric routing occurs when a packet takes one path to the destination and takes another path when returning to the source. This problem occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic comes through its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall isn't aware of such an established session.
2928

3029
### Fix the routing issue
3130

3231
#### Scenario 1: Azure Firewall without NAT Gateway
33-
When deploying an Azure Firewall into a subnet, you need to create a default route for the subnet. This route directs packets through the firewall's private IP address located on the AzureFirewallSubnet. For detailed steps, see [Deploy and configure Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md#create-a-default-route).
34-
When integrating the firewall into your load balancer scenario, ensure that your Internet traffic enters through the firewall's public IP address. The firewall applies its rules and NAT the packets to the load balancer's public IP address. The issue arises when packets arrive at the firewall's public IP address but return via the private IP address (using the default route).
32+
When you deploy an Azure Firewall into a subnet, you need to create a default route for the subnet. This route directs packets through the firewall's private IP address located on the AzureFirewallSubnet. For detailed steps, see [Deploy and configure Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md#create-a-default-route).
33+
When you integrate the firewall into your load balancer scenario, ensure that your Internet traffic enters through the firewall's public IP address. The firewall applies its rules and NATs the packets to the load balancer's public IP address. The problem arises when packets arrive at the firewall's public IP address but return via the private IP address (using the default route).
3534

3635
To prevent asymmetric routing, add a specific route for the firewall's public IP address. Packets intended for the firewall's public IP address are directed through the Internet, bypassing the default route to the firewall's private IP address.
3736

0 commit comments

Comments
 (0)