Statements (74)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Microsoft_Certified:_Azure_Network_Engineer_Associate
|
gptkbp:allows |
Deployment of multiple firewalls
|
gptkbp:can_be_used_with |
gptkb:Azure_Virtual_WAN
|
gptkbp:controls |
Azure Firewall instances
|
gptkbp:enables |
Secure connectivity
Network rules Application rules Multi-region firewall management |
https://www.w3.org/2000/01/rdf-schema#label |
Azure Firewall Manager
|
gptkbp:integrates_with |
gptkb:Azure_Security_Center
|
gptkbp:is_accessible_by |
gptkb:Azure_Portal
RESTAPI |
gptkbp:is_available_for |
All Azure subscriptions
|
gptkbp:is_available_in |
Multiple Azure regions
|
gptkbp:is_compatible_with |
gptkb:Azure_Virtual_Network
gptkb:philosopher gptkb:Azure_Kubernetes_Service |
gptkbp:is_designed_for |
Scalability
|
gptkbp:is_integrated_with |
gptkb:Azure_Active_Directory
Third-party security solutions |
gptkbp:is_optimized_for |
gptkb:benchmark
Cloud environments |
gptkbp:is_part_of |
gptkb:Microsoft_Azure
Microsoft cloud offerings Azure Networking services Azure security ecosystem |
gptkbp:is_used_for |
Data protection
Incident response Compliance requirements Control access to resources Network security Threat protection Secure AP Is Protect applications |
gptkbp:is_used_in |
Enterprise environments
Hybrid cloud environments |
gptkbp:managed_by |
gptkb:Azure_Resource_Manager
Azure management tools |
gptkbp:offers |
Security policies
|
gptkbp:provides |
Automated policy updates
Centralized logging User activity monitoring Network traffic analysis Integration with Azure Monitor Automated threat detection Centralized policy management Integration with Azure Policy Integration with Azure Sentinel Centralized management for Azure Firewall Logging and analytics capabilities |
gptkbp:setting |
High availability
User authentication Logging and monitoring Traffic filtering Geo-filtering |
gptkbp:supports |
IP address filtering
Network segmentation Policy-based management Service endpoints Secure remote access Threat intelligence Custom DNS settings Role-based access control User-defined routes Network security groups Custom rules VPN connectivity Virtual private network (VPN) connections Web application firewall capabilities Virtual network peering Firewall policies Application gateway integration |