Redigera

Dela via


Set-AzFirewallPolicyDraft

Saves a modified azure firewall policy draft

Syntax

Set-AzFirewallPolicyDraft
   -AzureFirewallPolicyName <String>
   -ResourceGroupName <String>
   [-AsJob]
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
Set-AzFirewallPolicyDraft
   -InputObject <PSAzureFirewallPolicyDraft>
   [-AsJob]
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
Set-AzFirewallPolicyDraft
   -FirewallPolicyObject <PSAzureFirewallPolicy>
   [-AsJob]
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
Set-AzFirewallPolicyDraft
   [-AsJob]
   -ResourceId <String>
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]

Description

The Set-AzFirewallPolicyDraft cmdlet updates an Azure Firewall Policy draft.

Examples

Example 1

Set-AzFirewallPolicyDraft -InputObject $fpDraft

This example sets the firewall policy draft with the new firewall policy draft value

Example 2

Set-AzFirewallPolicyDraft -AzureFirewallPolicyName firewallPolicy1 -ResourceGroupName TestRg -ThreatIntelMode "Alert"

This example sets the firewall policy draft with the new threat intel mode

Example 3

$threatIntelWhitelist = New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
Set-AzFirewallPolicyDraft -AzureFirewallPolicyName firewallPolicy1 -ResourceGroupName TestRg -ThreatIntelWhitelist $threatIntelWhitelist

This example sets the firewall policy draft with the new threat intel allowlist

Example 4

$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy  -HttpPort 100 -HttpsPort 101 -EnablePacFile  -PacFilePort 130 -PacFile "sampleurlfortesting.blob.core.windowsnet/nothing"
Set-AzFirewallPolicyDraft -AzureFirewallPolicyName firewallPolicy1 -ResourceGroupName TestRg -ExplicitProxy $exProxy

BasePolicy	                : null	
		DnsSettings  	            : null	
		Etag	                    : null	
		ExplicitProxy	
			EnableExplicitProxy	    : true	
			EnablePacFile	        : true	
			HttpPort	            : 100	
			HttpsPort	            : 101	
			PacFile                 : "sampleurlfortesting.blob.core.windowsnet/nothing"
			PacFilePort	            : 130	
		Id	                        : null	
		IntrusionDetection	        : null	
		Location	                : "westcentralus"	
		Name	                    : "firewallPolicy1"	
		PrivateRange	            : null
		PrivateRangeText	        : "[]"
		ProvisioningState	        : null	
		ResourceGroupName	        : "TestRg"	
		ResourceGuid	            : null	
		RuleCollectionGroups	    : null	
		Snat	
			AutoLearnPrivateRanges	: null	
			PrivateRanges	        : null	
		SqlSetting	                : null	
		Tag	                        : null	
		TagsTable	                : null	
		ThreatIntelMode	            : "Alert"	
		ThreatIntelWhitelist	    : null	
		Type	                    : null

This example sets the firewall policy draft with the explicit proxy settings

Parameters

-AsJob

Run cmdlet in the background

Type:SwitchParameter
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-AzureFirewallPolicyName

The resource name.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:True

-BasePolicy

The base policy to inherit from

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DefaultProfile

The credentials, account, tenant, and subscription used for communication with Azure.

Type:IAzureContextContainer
Aliases:AzContext, AzureRmContext, AzureCredential
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DnsSetting

The DNS Setting

Type:PSAzureFirewallPolicyDnsSettings
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ExplicitProxy

The Explicit Proxy Settings

Type:PSAzureFirewallPolicyExplicitProxy
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-FirewallPolicyObject

The AzureFirewall Policy associated with the draft

Type:PSAzureFirewallPolicy
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-InputObject

The AzureFirewall Policy draft

Type:PSAzureFirewallPolicyDraft
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-IntrusionDetection

The Intrusion Detection Setting

Type:PSAzureFirewallPolicyIntrusionDetection
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-PrivateRange

The Private IP Range

Type:String[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ResourceGroupName

The resource group name.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:True

-ResourceId

The resource Id.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:True

-Snat

The private IP addresses/IP ranges to which traffic will not be SNAT in Firewall Policy.

Type:PSAzureFirewallPolicySNAT
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-SqlSetting

The SQL related setting

Type:PSAzureFirewallPolicySqlSetting
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Tag

A hashtable which represents resource tags.

Type:Hashtable
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-ThreatIntelMode

The operation mode for Threat Intelligence.

Type:String
Accepted values:Alert, Deny, Off
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-ThreatIntelWhitelist

The allowlist for Threat Intelligence

Type:PSAzureFirewallPolicyThreatIntelWhitelist
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

String

PSAzureFirewallPolicy

Hashtable

Outputs

PSAzureFirewall