Skip to content

Commit e1d4496

Browse files
committed
minor update
1 parent 626ae82 commit e1d4496

3 files changed

Lines changed: 10 additions & 1 deletion

File tree

learn-pr/wwl-sci/design-solutions-network-security/includes/2-design-solutions-network-segmentation.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,3 +99,4 @@ Beyond virtual network and subnet boundaries, design microsegmentation within in
9999
- **NSG rules between application tiers.** For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100100
- **Private endpoints.** Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the virtual network, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101101
- **Azure Bastion.** Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.
102+
- **Virtual network encryption.** Enable [virtual network encryption](/azure/virtual-network/virtual-network-encryption-overview) to encrypt traffic between virtual machines and virtual machine scale sets within the same virtual network and across peered virtual networks. This protects data in transit at the network layer, even from users with access to the underlying infrastructure. Virtual network encryption requires the Accelerated Networking capability on supported VM SKUs.

learn-pr/wwl-sci/design-solutions-network-security/includes/4-design-solutions-network-posture-management.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,15 @@ Each attack path includes a risk level (High, Medium, or Low) determined by cont
5454

5555
The **cloud security explorer** complements attack path analysis by letting you build custom queries across your cloud security graph. You can query for specific network conditions, such as "show all internet-facing VMs without endpoint protection, that have network access to databases containing sensitive data."
5656

57+
## Verify reachability with network verifier
58+
59+
Network verifier is a feature of Azure Virtual Network Manager that lets you check whether your network policies allow or block traffic between Azure network resources. You create a verifier workspace within your network manager instance, define reachability analysis intents that specify source, destination, ports, and protocol, and then run a static analysis. The analysis evaluates NSG rules, ASG rules, Security Admin Rules, virtual network peering, route tables, service endpoints, private endpoints, Virtual WAN configurations, and Azure Firewall rules (static Layer 4) to determine whether packets can reach the destination.
60+
61+
Network verifier is useful during both the design and post-deployment phases of your network setup. When you encounter unexpected traffic allowances or blocks, the reachability analysis results reconstruct the source-to-destination path and show where the misconfiguration lies. Use this capability to validate segmentation intent, prove compliance with security requirements, and catch misconfigurations before or after they reach production.
62+
5763
## Validate posture with Network Watcher diagnostics
5864

59-
Azure Network Watcher provides diagnostic tools that help you verify your network configurations match your intended design. While the next unit covers network monitoring in depth, two Network Watcher capabilities are especially relevant for posture validation:
65+
Azure Network Watcher provides diagnostic tools that help you verify your network configurations match your intended design. While the next unit covers network monitoring in depth, several Network Watcher capabilities are especially relevant for posture validation:
6066

6167
- **IP flow verify** and **NSG diagnostics** check whether specific traffic is allowed or denied by evaluating the effective security rules at the VM or subnet level. Use these tools to confirm that your NSG configurations enforce the traffic-filtering policies you designed, without waiting for actual traffic to trigger a flow log entry.
6268

learn-pr/wwl-sci/design-solutions-network-security/includes/9-summary.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ You learned how to:
3333
- [Azure Virtual Network Manager overview](/azure/virtual-network-manager/overview)
3434
- [Security admin rules in Azure Virtual Network Manager](/azure/virtual-network-manager/concept-security-admins)
3535
- [Azure Network Security Perimeter](/azure/private-link/network-security-perimeter-concepts)
36+
- [Azure Virtual Network encryption](/azure/virtual-network/virtual-network-encryption-overview)
3637
- [Azure Firewall overview](/azure/firewall/overview)
3738
- [Azure Virtual WAN overview](/azure/virtual-wan/virtual-wan-about)
3839

@@ -52,6 +53,7 @@ You learned how to:
5253
- [Networking security recommendations reference](/azure/defender-for-cloud/recommendations-reference-networking)
5354
- [Identify and remediate attack paths](/azure/defender-for-cloud/how-to-manage-attack-path)
5455
- [Governance rules in Defender for Cloud](/azure/defender-for-cloud/governance-rules)
56+
- [Network verifier in Azure Virtual Network Manager](/azure/virtual-network-manager/concept-virtual-network-verifier)
5557
- [Azure Policy built-in definitions for Azure networking](/azure/virtual-network/policy-reference)
5658

5759
### Network monitoring

0 commit comments

Comments
 (0)