Azure Firewall Manager

GPTKB entity

Statements (74)
Predicate Object
gptkbp:instance_of gptkb:software
gptkbp:bfsLayer 4
gptkbp:bfsParent gptkb:Microsoft_Certified:_Azure_Network_Engineer_Associate
gptkbp:allows Deployment of multiple firewalls
gptkbp:can_be_used_with gptkb:Azure_Virtual_WAN
gptkbp:controls Azure Firewall instances
gptkbp:enables Secure connectivity
Network rules
Application rules
Multi-region firewall management
https://www.w3.org/2000/01/rdf-schema#label Azure Firewall Manager
gptkbp:integrates_with gptkb:Azure_Security_Center
gptkbp:is_accessible_by gptkb:Azure_Portal
RESTAPI
gptkbp:is_available_for All Azure subscriptions
gptkbp:is_available_in Multiple Azure regions
gptkbp:is_compatible_with gptkb:Azure_Virtual_Network
gptkb:philosopher
gptkb:Azure_Kubernetes_Service
gptkbp:is_designed_for Scalability
gptkbp:is_integrated_with gptkb:Azure_Active_Directory
Third-party security solutions
gptkbp:is_optimized_for gptkb:benchmark
Cloud environments
gptkbp:is_part_of gptkb:Microsoft_Azure
Microsoft cloud offerings
Azure Networking services
Azure security ecosystem
gptkbp:is_used_for Data protection
Incident response
Compliance requirements
Control access to resources
Network security
Threat protection
Secure AP Is
Protect applications
gptkbp:is_used_in Enterprise environments
Hybrid cloud environments
gptkbp:managed_by gptkb:Azure_Resource_Manager
Azure management tools
gptkbp:offers Security policies
gptkbp:provides Automated policy updates
Centralized logging
User activity monitoring
Network traffic analysis
Integration with Azure Monitor
Automated threat detection
Centralized policy management
Integration with Azure Policy
Integration with Azure Sentinel
Centralized management for Azure Firewall
Logging and analytics capabilities
gptkbp:setting High availability
User authentication
Logging and monitoring
Traffic filtering
Geo-filtering
gptkbp:supports IP address filtering
Network segmentation
Policy-based management
Service endpoints
Secure remote access
Threat intelligence
Custom DNS settings
Role-based access control
User-defined routes
Network security groups
Custom rules
VPN connectivity
Virtual private network (VPN) connections
Web application firewall capabilities
Virtual network peering
Firewall policies
Application gateway integration