{"id":94105,"date":"2024-03-15T18:00:34","date_gmt":"2024-03-15T12:30:34","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=94105"},"modified":"2024-03-22T15:25:39","modified_gmt":"2024-03-22T09:55:39","slug":"azure-network-security-groups","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/","title":{"rendered":"How to Create Azure Network Security Groups?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">An Azure Network Security Group (NSG) serves as a major component of Azure\u2019s security fabric. With the help of NSG, you can filter the traffic to and from the Azure resources within a Virtual Network (VNet).<\/span><\/p>\n<p>For those preparing for the <a href=\"https:\/\/www.whizlabs.com\/microsoft-azure-certification-az-104\/\" target=\"_blank\" rel=\"noopener\">AZ-104 certification exam<\/a>, understanding Azure Network Security Groups is essential, as it&#8217;s a key aspect of managing Azure resources securely.<\/p>\n<p>This blog post explores about <span style=\"font-weight: 400;\">Azure Network Security Groups, <\/span><span style=\"font-weight: 400;\">Azure Network Security Group Rules, how Network Security Group works, Azure Network Security Group use cases, how<\/span> to create Network Security Groups, and how they can improve Azure security in real-time via our hands-on lab settings.<\/p>\n<p>Let&#8217;s dive in!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#Azure_Network_Security_Groups_An_Overview\" >Azure Network Security Groups: An Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#Azure_Network_Security_Group_Rules\" >Azure Network Security Group Rules<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#How_does_Azure_Network_Security_work\" >How does Azure Network Security work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#How_to_create_Azure_network_security_groups\" >How to create Azure network security groups?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#Azure_NSG_Best_Practices\" >Azure NSG Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#FAQs\" >FAQs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/azure-network-security-groups\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Azure_Network_Security_Groups_An_Overview\"><\/span><span style=\"font-weight: 400;\">Azure Network Security Groups: An Overview<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Azure Network Security Groups (NSGs) are essential for managing the network traffic in virtual networks within the Azure ecosystem.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It withholds a certain set of rules to allow or deny the network traffic based upon the specified conditions, such as<strong> source and destination IP addresses, ports, and protocols.<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security rules that permit or prohibit network traffic to and from various Azure resource types are contained in a network security group. For every rule, you can set the protocol, port, source, and destination.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Azure Network Security Group rules can vary from zero to many depending on the constraints of an Azure subscription.<\/span><\/p>\n<blockquote><p>Also Read: Free <a href=\"https:\/\/www.whizlabs.com\/blog\/azure-administrator-az-104-exam-questions\/\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Administrator AZ-104 Exam Questions\u00a0<\/a><\/p><\/blockquote>\n<h3><span class=\"ez-toc-section\" id=\"Azure_Network_Security_Group_Rules\"><\/span><span style=\"font-weight: 400;\">Azure Network Security Group Rules<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Permit Vnet InBound: <\/b><span style=\"font-weight: 400;\">This rule permits unrestricted communication between all hosts (including subnets) inside the virtual network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Permit Azure LoadBalancer InBound:<\/b><span style=\"font-weight: 400;\"> This rule enables traffic to be sent between your virtual machine and an Azure load balancer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Deny All InBound:<\/b><span style=\"font-weight: 400;\"> It is the reject-all rule, which shields the virtual machine (VM) from harmful access by default to block all traffic coming in to the VM that originates outside the Azure Vnet.<\/span><\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"How_does_Azure_Network_Security_work\"><\/span><span style=\"font-weight: 400;\">How does Azure Network Security work?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Azure Network Security Group (NSG) from Microsoft is an ideal choice for protecting virtual networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Network administrators can easily <strong>arrange, filter, guide, and control various network traffic flows<\/strong> by using this application.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You can set up multiple incoming and outgoing rules to allow or deny specific types of traffic while creating Azure Network security groups.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You must create and set up each rule individually if you wish to use Azure Network Security Groups.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">An Azure virtual network may contain resources from several Azure services. Every virtual network subnet and network connection in a virtual machine can have zero or one network security group setup. <\/span><span style=\"font-weight: 400;\">A single network security group can have any number of subnets and network connections connected to it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can set up whatever rules you want, such as whether or not the traffic passing through the network is safe and should be allowed, depending on the situation.<\/span><\/p>\n<p>Network Security Groups (NSGs) operate by comparing network traffic to a set of rules that you have established. These guidelines specify whether traffic should be allowed or prohibited by the program.<\/p>\n<p>Here&#8217;s a rundown of how this operates.<\/p>\n<ul>\n<li><strong>Rule Creation:<\/strong> In the NSG, you can design and establish rules that indicate which traffic parameters are allowed or prohibited.<\/li>\n<li><strong>Priority Assignment:<\/strong> A priority is given to every rule. NSGs process rules from the lowest number (highest priority) to the highest number in descending order of priority.<\/li>\n<li><strong>Traffic Analysis:<\/strong> NSGs compare incoming and outgoing traffic to the established rules as it tries to access or depart a resource.<\/li>\n<li><strong>Action Enforcement:<\/strong> An action (allow or deny) is enforced if the traffic pattern corresponds to a regulation.<\/li>\n<\/ul>\n<p>Additionally, Azure network security groups include default security rules that give your network a rudimentary level of protection. These defaults function at a lower priority than custom rules, even though you cannot remove them. This enables you to override the settings when needed using your preferences.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_to_create_Azure_network_security_groups\"><\/span><span style=\"font-weight: 400;\">How to create Azure network security groups?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>As an initial step, access the Whizlabs hands-on labs page and type<a href=\"https:\/\/www.whizlabs.com\/labs\/understand-network-security-group-rules\" target=\"_blank\" rel=\"noopener\"> N<\/a><span style=\"font-weight: 400;\">etwork security group in the search bar.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94128\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups.jpg\" alt=\"network security groups\" width=\"1592\" height=\"780\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups.jpg 1592w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups-300x147.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups-1024x502.jpg 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups-768x376.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups-1536x753.jpg 1536w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/network-security-groups-150x73.jpg 150w\" sizes=\"(max-width: 1592px) 100vw, 1592px\" \/><\/p>\n<p>Now choose the guided labs, click on start lab and follow lab instructions.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94129\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs.jpg\" alt=\"start guided labs\" width=\"1661\" height=\"943\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs.jpg 1661w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs-300x170.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs-1024x581.jpg 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs-768x436.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs-1536x872.jpg 1536w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/start-guided-labs-150x85.jpg 150w\" sizes=\"(max-width: 1661px) 100vw, 1661px\" \/><\/p>\n<p><strong>Task 1: Sign in to Azure Portal<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access the Azure portal by clicking the Open Console button or navigating to<\/span><a href=\"https:\/\/portal.azure.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\"> https:\/\/portal.azure.com<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It&#8217;s advised to use incognito mode to prevent potential Azure portal cache issues.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If automatically logged into another Azure account, log out and clear the cache.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sign in using the provided username and password.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If login issues persist, select End Lab and restart the lab.<\/span><\/li>\n<\/ul>\n<p><strong>Task 2: Create a virtual machine<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">In the search box at the top of the Azure portal, enter Virtual machine. Select Virtual machines from the search results.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94108\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/vm-create.jpg\" alt=\"vm create\" width=\"755\" height=\"436\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/vm-create.jpg 755w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/vm-create-300x173.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/vm-create-150x87.jpg 150w\" sizes=\"(max-width: 755px) 100vw, 755px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In the Virtual Machines section, select + Create &gt; Azure virtual machine.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94109\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/create.jpg\" alt=\"create\" width=\"587\" height=\"601\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/create.jpg 587w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/create-293x300.jpg 293w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/create-150x154.jpg 150w\" sizes=\"(max-width: 587px) 100vw, 587px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In the &#8220;Create a Virtual Machine&#8221; tab, input or choose the specified values in the &#8220;Basics&#8221; tab.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Input Resource group details, Administrator Account details, and Inbound Port rules as shown below:<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94111\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/disable.jpg\" alt=\"disable\" width=\"787\" height=\"381\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/disable.jpg 787w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/disable-300x145.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/disable-768x372.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/disable-150x73.jpg 150w\" sizes=\"(max-width: 787px) 100vw, 787px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Leave the defaults on the Networking and Management tabs, go to the Monitoring tab, and Disable the Boot diagnostics.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94112\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/deployment.jpg\" alt=\"deployment\" width=\"715\" height=\"523\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/deployment.jpg 715w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/deployment-300x219.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/deployment-150x110.jpg 150w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click on the &#8220;Review + Create&#8221; button located at the bottom of the page, and then proceed to click on &#8220;Create.&#8221; After a few minutes, your VM will be deployed.<\/span><\/p>\n<p><strong>Task 3: Allow RDP traffic via NSG rules<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">In the search box located at the top of the Azure portal page, type &#8220;Virtual machine.&#8221; Choose &#8220;Virtual Machines&#8221; from the search results. Select the virtual machine you created, named &#8220;myWhizlabsVM1.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Navigate to the &#8220;Networking&#8221; section in the left menu on the Overview page of your VM. Here, you will find information about the network interface, including the public and private IP addresses, as well as the inbound and outbound port rules.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94113\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules.jpg\" alt=\"rules\" width=\"779\" height=\"320\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules.jpg 779w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-300x123.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-768x315.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-150x62.jpg 150w\" sizes=\"(max-width: 779px) 100vw, 779px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click on Add inbound port rule and enter or select the following information:<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94114\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/inbound-rules.jpg\" alt=\"inbound rules\" width=\"334\" height=\"503\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/inbound-rules.jpg 334w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/inbound-rules-199x300.jpg 199w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/inbound-rules-150x226.jpg 150w\" sizes=\"(max-width: 334px) 100vw, 334px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click on the Add button. Now, the security rule will be created which will ensure that we can connect on port 3389 to the virtual machine.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94115\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/port-details.jpg\" alt=\"port details\" width=\"968\" height=\"95\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/port-details.jpg 968w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/port-details-300x29.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/port-details-768x75.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/port-details-150x15.jpg 150w\" sizes=\"(max-width: 968px) 100vw, 968px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">To initiate a connection to the virtual machine, navigate to the &#8220;Overview&#8221; section and click on the &#8220;Connect &gt; RDP&#8221; button on the overview page. Next, select the &#8220;Download RDP file&#8221; option.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Open the downloaded RDP file, and you will be prompted to enter the username and password for the Remote Desktop Connection.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94116\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/credentials.jpg\" alt=\"credentials\" width=\"662\" height=\"576\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/credentials.jpg 662w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/credentials-300x261.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/credentials-150x131.jpg 150w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click OK. You will now be connected to your Virtual machine.<\/span><\/p>\n<p><strong>Task 4: Allow HTTP traffic via NSG rules<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">On the Windows virtual machine, launch the Server Manager, and select &#8220;Add Roles and Features.&#8221; Now, proceed to install a web server on this specific machine by adding a network security group rule. This rule will permit traffic to enter the virtual machine on Port 80, enabling access to the web server.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94117\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-manager.jpg\" alt=\"server manager\" width=\"783\" height=\"458\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-manager.jpg 783w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-manager-300x175.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-manager-768x449.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-manager-150x88.jpg 150w\" sizes=\"(max-width: 783px) 100vw, 783px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click on Next until you get an option to select Web Server (IIS). Then, again click on Next until you get an option to install.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Select &#8220;Install.&#8221; After the installation is finished, click on &#8220;Close.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open the Microsoft Edge web browser on the Windows VM and enter &#8220;<\/span><a href=\"http:\/\/localhost\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">http:\/\/localhost\/<\/span><\/a><span style=\"font-weight: 400;\">&#8221; in the search bar to verify that Internet Information Services (IIS) is successfully installed on the machine.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Now, return to the Azure portal. In the Networking section of the virtual machine \u201cmyWhizlabsVM1\u201d, select Add inbound port rule and enter or select the following information.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94118\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-roles.jpg\" alt=\"server roles\" width=\"752\" height=\"542\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-roles.jpg 752w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-roles-300x216.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-roles-150x108.jpg 150w\" sizes=\"(max-width: 752px) 100vw, 752px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click on the Add button. Now, the security rule will be created.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94120\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-inbound.jpg\" alt=\"rules-inbound\" width=\"781\" height=\"221\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-inbound.jpg 781w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-inbound-300x85.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-inbound-768x217.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/rules-inbound-150x42.jpg 150w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In the networking section, you will find the public IP address. Copy the public IP.\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94121\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/nic.jpg\" alt=\"nic\" width=\"774\" height=\"127\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/nic.jpg 774w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/nic-300x49.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/nic-768x126.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/nic-150x25.jpg 150w\" sizes=\"(max-width: 774px) 100vw, 774px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Now, paste the public IP on your web browser. You will see the page displaying Internet Information Services.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94119\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server.jpg\" alt=\"server\" width=\"757\" height=\"402\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server.jpg 757w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-300x159.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/server-150x80.jpg 150w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/><\/p>\n<blockquote><p><b><i>Do you know?<\/i><\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">Azure Network Security Group (NSG) rules enable you to manage incoming and outgoing traffic to virtual machines. These rules are assessed in the specified order, and the first rule that matches the traffic is applied. This implies that if a rule either permits or denies a connection, subsequent rules are not considered for that particular traffic.<\/span><\/i><\/p><\/blockquote>\n<p><strong>Task 5: Validation test<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">After finishing the lab steps, select the Validation button or navigate to the Lab Validation section. Click on the &#8220;Validate My Lab&#8221; button. You will receive the &#8220;Lab Overall Status,&#8221; indicating whether or not you have completed the lab. The sample output will provide details about the validation results.<\/span><\/p>\n<p><strong>Task 6: Deleting the resources<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">In the search box at the top of the Azure portal, enter the Resource Groups. Select Resource groups from the results.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94122\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/resource-groups.jpg\" alt=\"resource groups\" width=\"784\" height=\"371\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/resource-groups.jpg 784w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/resource-groups-300x142.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/resource-groups-768x363.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/resource-groups-150x71.jpg 150w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Click on the name of the resource group.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94124\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/name.jpg\" alt=\"name\" width=\"775\" height=\"388\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/name.jpg 775w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/name-300x150.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/name-768x384.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/name-150x75.jpg 150w\" sizes=\"(max-width: 775px) 100vw, 775px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Select all the resources in that Resource group by clicking on the Name checkbox.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Click three dots on the right and click Delete.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94125\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/del.jpg\" alt=\"del\" width=\"806\" height=\"217\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/del.jpg 806w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/del-300x81.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/del-768x207.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/del-150x40.jpg 150w\" sizes=\"(max-width: 806px) 100vw, 806px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Now type Delete to confirm deletion.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94126\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/delete.jpg\" alt=\"delete\" width=\"783\" height=\"232\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/delete.jpg 783w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/delete-300x89.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/delete-768x228.jpg 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/delete-150x44.jpg 150w\" sizes=\"(max-width: 783px) 100vw, 783px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Confirm Deletion.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Azure_NSG_Best_Practices\"><\/span>Azure NSG Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It can be difficult to operate with numerous NSGs, particularly if you have to comprehend the rules that are in place while your network traffic is controlled by two or more NSGs. However, you can manage Azure Network security groups more skillfully if you adhere to a few recommended practices.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-94131\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-scaled.webp\" alt=\"Azure-NSG-Best-Practices\" width=\"2560\" height=\"2048\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-scaled.webp 2560w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-300x240.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-1024x819.webp 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-768x614.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-1536x1229.webp 1536w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-2048x1638.webp 2048w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/Azure-NSG-Best-Practices-150x120.webp 150w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p><b>Sync NSGs with Services and Resource Groups<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Not all Azure resources hosted on virtual networks require you to configure an NSG. You could simply manage all of your rules on the VNet or subnet level, according to your use case. On the other hand, maintainability must be considered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, since you do not have to take into account any other NSG rules, handling all of the access rules in just one NSG can appear easier.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, as you scale, managing hundreds of allow and deny parameters might become challenging for an NSG with up to <strong>1,000 rules<\/strong>. This intricacy may therefore result in errors and misconfigurations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similar to any other technological implementation, the strategy and the structure must coincide. Be careful to consider your NSG rules&#8217; maintainability when you design your Azure security plan.<\/span><\/p>\n<p><b>Employ sensible naming conventions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure offers you a great deal of resource naming flexibility. The amount of work required to maintain your Azure setup will go down if you name your Azure Network security groups in a way that gives the reader sufficient context.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, it is much simpler for support to pinpoint an NSG named NSG-SRV-WEB-01 than it is to recognize it as NSG01 if you would like to activate an NSG for a virtual machine (VM) called SRV-WEB-01.<\/span><\/p>\n<p><b>Utilize IP Ranges to Simplify the Creation of Rules<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With Azure NSGs, you can input a range or only one IP address and port. Use ranges rather than individual addresses whenever possible to reduce the amount of rules you have to write and maintain. However, using one IP address and port is advised if you need to limit access to a specific resource.<\/span><\/p>\n<p><b>Separate the Rule Priority Numbers with Spaces<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As previously said, rules are processed by Azure NSGs according to priority, with lesser numbers being processed first. As a result, while drafting rules, include sufficient room between your top choices when you need to draft a rule that needs to be processed before one that comes before it.\u00a0<\/span><\/p>\n<p><b>Employ Tags to Enhance Readability<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Use virtual network service tags when you need to manage several objects. A collection of IP address prefixes associated with a specific Azure service are represented by these Azure resources.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, &#8220;VirtualNetwork&#8221; denotes the full range of VNet addresses, and &#8220;Internet&#8221; denotes all publicly routable external IP addresses. It is therefore easier to interpret your NSG rules if you use the tags in the source and destination parameters.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"FAQs\"><\/span><span style=\"font-weight: 400;\">FAQs<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Is Azure NSG stateful or stateless?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">An Azure NSG is a stateful packet filtering firewall, and it helps you to manage the access based on a 5-tuple approach.<\/span><\/p>\n<p><b>What is the limit of the Azure network security groups?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A standard Azure subscription can indeed have up to 5,000 Network Security Groups (NSGs), and each NSG can have 1,000 rules(maximum).<\/span><\/p>\n<p><b>How much do Azure network security groups cost?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Network Security Group usage is complimentary, but regular charges for data ingress and egress are applicable.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span style=\"font-weight: 400;\">Conclusion<\/span><b><\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Hope this blog provides a comprehensive guide on creating an Azure Network Security Group.<\/p>\n<div class=\"react-scroll-to-bottom--css-vcqkg-1n7m0yu\">\n<div class=\"flex flex-col text-sm pb-9\">\n<div class=\"w-full text-token-text-primary sm:AIPRM__conversation__response\" data-testid=\"conversation-turn-5\">\n<div class=\"px-4 py-2 justify-center text-base md:gap-6 m-auto\">\n<div class=\"flex flex-1 text-base mx-auto gap-3 md:px-5 lg:px-1 xl:px-5 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem] group final-completion\">\n<div class=\"relative flex w-full flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 overflow-x-auto\" data-message-author-role=\"assistant\" data-message-id=\"cab16590-397c-4d10-872e-63714a1c687a\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light AIPRM__conversation__response\">\n<p>By following these steps, you can create an Azure Network Security Group (NSG) through hands-on labs, gaining practical experience in configuring network security in Azure environments.<\/p>\n<p>As a next step, consider experimenting in an Azure <a href=\"https:\/\/www.whizlabs.com\/labs\/sandbox\" target=\"_blank\" rel=\"noopener\">sandbox<\/a> environment to enrich your knowledge and gain practical experience in configuring network security within Azure.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An Azure Network Security Group (NSG) serves as a major component of Azure\u2019s security fabric. With the help of NSG, you can filter the traffic to and from the Azure resources within a Virtual Network (VNet). For those preparing for the AZ-104 certification exam, understanding Azure Network Security Groups is essential, as it&#8217;s a key aspect of managing Azure resources securely. This blog post explores about Azure Network Security Groups, Azure Network Security Group Rules, how Network Security Group works, Azure Network Security Group use cases, how to create Network Security Groups, and how they can improve Azure security in [&hellip;]<\/p>\n","protected":false},"author":223,"featured_media":94166,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[5128,5129],"class_list":["post-94105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-azure","tag-azure-network-security-groups","tag-create-azure-network-security-groups"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",1280,720,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",1280,720,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",1280,720,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-640x720.webp",640,720,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2024\/03\/azure-network-security-groups-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Dharmendra Digari","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/dharmendrawhizlabs-com\/"},"uagb_comment_info":3,"uagb_excerpt":"An Azure Network Security Group (NSG) serves as a major component of Azure\u2019s security fabric. With the help of NSG, you can filter the traffic to and from the Azure resources within a Virtual Network (VNet). For those preparing for the AZ-104 certification exam, understanding Azure Network Security Groups is essential, as it&#8217;s a key&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/94105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/223"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=94105"}],"version-history":[{"count":16,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/94105\/revisions"}],"predecessor-version":[{"id":94169,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/94105\/revisions\/94169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/94166"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=94105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=94105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=94105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}