Skip to content

Commit ab67176

Browse files
Merge pull request #54040 from staleycyn/patch-1
Content-drift network security groups
2 parents 10d0d68 + e826e32 commit ab67176

5 files changed

Lines changed: 20 additions & 5 deletions

File tree

learn-pr/wwl-azure/configure-network-security-groups/includes/3-determine-network-security-groups-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Let's review the characteristics of security rules in network security groups.
1717
| Source | Any, IP Addresses, My IP address, Service Tag, or Application security group |
1818
| Source port ranges | Specify the ports on which the rule allows or denies traffic |
1919
| Destination | Any, IP Addresses, Service Tag, or Application security group |
20-
| Protocol | Restrict the rule to the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), or Internet Control Message Protocol (ICMP). The default is for the rule to apply to all protocols (Any). |
20+
| Protocol | Restrict the rule to Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), Encapsulating Security Payload (ESP), or Authentication Header (AH). ESP and AH protocols are only available via JSON templates and PowerShell. The default is for the rule to apply to all protocols (Any). |
2121
| Action | Allow or Deny |
2222
| Priority | A value between 100 and 4,096 that's unique for all security rules within the NSG |
2323

learn-pr/wwl-azure/configure-network-security-groups/includes/4-determine-network-security-groups-effective-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,4 +34,4 @@ If you have several network security groups and aren't sure which security rules
3434
:::image type="content" source="../media/effective-security-rules-d93ab464.png" alt-text="Screenshot of the Networking page in the Azure portal showing the Effective security rules link highlighted.":::
3535

3636
> [!NOTE]
37-
> [Network Watcher](/azure/network-watcher/effective-security-rules-overview) provides a consolidated view of your infrastructure rules.
37+
> [Network Watcher](/azure/network-watcher/effective-security-rules-overview) provides a consolidated view of your infrastructure rules, including both NSG rules and Azure Virtual Network Manager security admin rules. The IP flow verify feature evaluates traffic against both NSG rules and any security admin rules that may be in effect.

learn-pr/wwl-azure/configure-network-security-groups/includes/5-create-network-security-groups-rules.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,21 @@ Let's look at some of the properties you need to specify to create your security
1818

1919
:::image type="content" source="../media/security-priority.png" alt-text="Screenshot that shows how to set the priority value for a security rule in the Azure portal.":::
2020

21+
### When to use augmented security rules
22+
23+
A single network security group rule can contain multiple values in the Source, Destination, and Service fields. This approach, called augmented security rules, reduces the total number of rules needed and simplifies NSG management.
24+
25+
**Things to know about augments security rules**
26+
27+
- **Multiple IP addresses**: Combine multiple IP addresses into one rule.
28+
29+
- **Multiple port ranges**: Specify multiple ports and ranges in the Service field.
30+
31+
- **Service tags and ASGs**: Mix service tags, application security groups, and IP addresses within the same rule.
32+
33+
- **Reduced rule count**: Instead of creating separate rules for each IP range or port, combine them into fewer, more manageable rules.
34+
35+
In enterprise environments with many IP ranges or services, augmented rules prevent NSG rule sprawl. For example, instead of creating four separate rules for ports 80, 443, 8080, and 8090, create one rule with all the ports.
2136

2237
> [!TIP]
23-
> Expand your learning with the [Secure and isolate access to Azure resources by using network security groups and service endpoints](/training/modules/secure-and-isolate-with-nsg-and-service-endpoints/) training module. This module includes a sandbox where you can practice.
38+
> Expand your learning with the [Secure and isolate access to Azure resources by using network security groups and service endpoints](/training/modules/secure-and-isolate-with-nsg-and-service-endpoints/) training module. This module includes a sandbox where you can practice.

learn-pr/wwl-azure/configure-network-security-groups/includes/9-summary-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Copilot can assist you in designing Azure infrastructure solutions. Copilot can
2323

2424
## Learn more with documentation
2525

26-
- [Read about network security groups](/azure/virtual-network/security-overview). This article describes the properties of a network security group rule, the default security rules that are applied, and the rule properties that you can modify.
26+
- [Read about network security groups](/azure/virtual-network/network-security-groups-overview). This article describes the properties of a network security group rule, the default security rules that are applied, and the rule properties that you can modify.
2727

2828
- [Filter network traffic with network security groups in the Azure portal](/azure/virtual-network/tutorial-filter-network-traffic). Learn how to create a network security group and an application security group.
2929

learn-pr/wwl-azure/configure-network-security-groups/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Configure Network Security Groups
77
description: "Learn how to implement network security groups, and ensure network security group rules are correctly applied."
8-
ms.date: 02/20/2026
8+
ms.date: 03/23/2026
99
author: wwlpublish
1010
ms.author: cynthist
1111
ms.topic: module

0 commit comments

Comments
 (0)