New-AzFirewallPolicyIntrusionDetection
Creates a new Azure Firewall Policy Intrusion Detection to associate with Firewall Policy
Syntax
New-AzFirewallPolicyIntrusionDetection
-Mode <String>
[-Profile <String>]
[-SignatureOverride <PSAzureFirewallPolicyIntrusionDetectionSignatureOverride[]>]
[-BypassTraffic <PSAzureFirewallPolicyIntrusionDetectionBypassTrafficSetting[]>]
[-PrivateRange <String[]>]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
The New-AzFirewallPolicyIntrusionDetection cmdlet creates an Azure Firewall Policy Intrusion Detection Object.
Examples
Example 1: Create intrusion detection with mode
New-AzFirewallPolicyIntrusionDetection -Mode "Alert"
This example creates intrusion detection with Alert (detection) mode
Example 2: Create intrusion detection with signature overrides
$signatureOverride = New-AzFirewallPolicyIntrusionDetectionSignatureOverride -Id "123456798" -Mode "Deny"
New-AzFirewallPolicyIntrusionDetection -Mode "Alert" -SignatureOverride $signatureOverride
This example creates intrusion detection with specific signature override
Example 3: Create firewall policy with intrusion detection configured with bypass traffic setting
$bypass = New-AzFirewallPolicyIntrusionDetectionBypassTraffic -Name "bypass-setting" -Protocol "TCP" -DestinationPort "80" -SourceAddress "10.0.0.0" -DestinationAddress "10.0.0.0"
$intrusionDetection = New-AzFirewallPolicyIntrusionDetection -Mode "Deny" -BypassTraffic $bypass
New-AzFirewallPolicy -Name fp1 -Location "westus2" -ResourceGroupName TestRg -SkuTier "Premium" -IntrusionDetection $intrusionDetection
This example creates intrusion detection with bypass traffic setting
Example 4: Create firewall policy with intrusion detection configured with private ranges setting
$intrusionDetection = New-AzFirewallPolicyIntrusionDetection -Mode "Deny" -PrivateRange @("167.220.204.0/24", "167.221.205.101/32")
New-AzFirewallPolicy -Name fp1 -Location "westus2" -ResourceGroupName TestRg -SkuTier "Premium" -IntrusionDetection $intrusionDetection
This example creates intrusion detection with bypass traffic setting
Example 5: Create firewall policy with intrusion detection profile setting
$intrusionDetection = New-AzFirewallPolicyIntrusionDetection -Mode "Deny" -Profile �Advanced�
New-AzFirewallPolicy -Name fp1 -Location "westus2" -ResourceGroupName TestRg -SkuTier "Premium" -IntrusionDetection $intrusionDetection
This example creates intrusion detection with Alert and Deny mode and Advanced signatures Profile.
Parameters
-BypassTraffic
List of rules for traffic to bypass.
Type: | PSAzureFirewallPolicyIntrusionDetectionBypassTrafficSetting[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefaultProfile
The credentials, account, tenant, and subscription used for communication with Azure.
Type: | IAzureContextContainer |
Aliases: | AzContext, AzureRmContext, AzureCredential |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Mode
Intrusion Detection general state.
Type: | String |
Accepted values: | Off, Alert, Deny |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PrivateRange
List of IDPS Private IP ranges.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Profile
Sets IDPS signatures profile.
Type: | String |
Position: | Named |
Default value: | For newly created policy the default IDPS profile is �Standard� and for existing policy without IDPS profile setting, the default is �Advanced� |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureOverride
List of specific signatures states.
Type: | PSAzureFirewallPolicyIntrusionDetectionSignatureOverride[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
None
Outputs
Azure PowerShell