MEDIUM
Source
CloudSploit
ID
monitor-next-generation-firewall

Monitor Next Generation Firewall

Ensures that Next Generation Firewall (NGFW) Monitoring is enabled in Microsoft Defender.

When this setting is enabled, Microsoft Defender for Cloud will search for deployments where a NGFW is recommended.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for “Policy” and select the “Policy”. Step

  3. Scroll down the left navigation panel and select “Compliance”. Step

  4. On the “Policy | Compliance” page, under “Name” column select compliance for the “Scope” of necessary Subscription. Step

  5. On the “Policy| Compliance” page select the “View Assignment” Tab on the top. Step

  6. On the “Policy| Compliance | Subscription” page, Select the “Edit Assignment” Tab at the top. Step

  7. On the Assign Initiative page, select the “Parameters” tab and uncheck “Only show parameters that need input or review”. It will show you a list of parameters.

  8. In the list search for the setting “All Internet traffic should be routed via your deployed Azure Firewall”. If it’s set to “Disabled” then “Next Generation Firewall Monitoring” is not enabled on the selected “Subscription”. Step

  9. To enable “Next Generation Firewall Monitoring” click to open the dropdown of “All Internet traffic should be routed via your deployed Azure Firewall” and select the “AuditIfNotExists” option. Step

  10. Click on the “Review + save” button to make the necessary changes. Step

  11. Repeat steps number 3 - 10 to ensure “Next Generation Firewall Monitoring” is configured from the Azure Defender.