Skip to content

Conversation

@kshitiz-prog
Copy link
Collaborator

No description provided.

@kshitiz-prog kshitiz-prog self-assigned this Jan 6, 2026
@kshitiz-prog kshitiz-prog changed the title Feature 25535 Network-25535 : Outbound traffic from VNET integrated workloads is routed through Azure Firewall Jan 6, 2026
@kshitiz-prog
Copy link
Collaborator Author

@microsoft-github-policy-service agree

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds a new network security assessment test (Test-Assessment-25535) that verifies outbound traffic from VNET-integrated workloads is routed through Azure Firewall. The test validates that network interfaces have user-defined routes directing 0.0.0.0/0 traffic to Azure Firewall private IP addresses.

Key Changes

  • Implements automated assessment to check if NICs have default routes (0.0.0.0/0) pointing to Azure Firewall
  • Validates routing configuration across all subscriptions by comparing effective route tables against Azure Firewall private IPs
  • Generates compliance reports showing which NICs are properly configured to route through Azure Firewall

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 8 comments.

File Description
src/powershell/tests/Test-Assessment.25535.ps1 New PowerShell test script that enumerates Azure Firewalls, retrieves NIC effective routes, and validates routing compliance
src/powershell/tests/Test-Assessment.25535.md Documentation describing the security control, its importance, and remediation steps

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants