Azure: Enable NSG Flow Logs

To enable Azure VPC flow logs, follow the below steps.

Procedure


Step 1

Go to the Resource Groups section in Azure portal.

Step 2

Click the Create button.

Step 3

Select the subscription and provide a name for this new resource group.

Step 4

Select a Region. (example: (US) East US).

Step 5

Click the Review + create button.

Step 6

Go to the storage accounts section and click the Create button.

Step 7

Select the Subscription and Resource group that was just created.

Step 8

Select the same region as the resource group.

Step 9

Provide a name for the storage account.

Note that Redundancy cannot be locally-redundant storage(LRS)

Step 10

Click the Review + create button. This creates a storage account where NSG flow logs are stored.

Step 11

Go to the Subscription section and find the subscription that was recently created.

Step 12

Navigate to Resource Providers.

Step 13

Ensure that the microsoft.insights and Microsoft.EventGrid providers are registered. If they are not registered, click the Register button.

Step 14

Go to the Network Watcher section.

Step 15

Click Add and add the regions that you want NSG flow logs to be enabled for.

Step 16

Go to Network Watcher > NSG flow logs.

Step 17

Create flow logs for the NSG where you want to enable NSG flow log. Provide the storage account created above. Set the Retention days as 30.

Step 18

Navigate to the storage account created and click on Events.

Step 19

Click Event Subscription.

Step 20

Provide a name for this event subscription.

Step 21

Select the resource group that was created above.

Step 22

Provide a System Topic Name.

Step 23

For Filter to Event Types, the default value is Blob Created and Blob Deleted.

Step 24

For Endpoint Type, select Web Hook.

Step 25

Click the Select an endpoint link.

The Subscriber Endpoint is https://prod1-webhook.vtxsecurityservices.com:8093/webhook/<tenant_name>/azure. Tenant name is assigned by Multicloud Defense. You can find tenant name by clicking on the username in Multicloud Defense Controller.