🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 3
Domain 3 — Module 1 of 9 11%
13 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 3: Microsoft Security Solutions Premium ⏱ ~12 min read

Azure Network Defence: DDoS, Firewall & WAF

Three layers of Azure network protection — how DDoS Protection absorbs floods, Azure Firewall filters traffic, and WAF blocks web exploits like SQL injection.

Why does Azure need three layers of network defence?

☕ Simple explanation

Think of a bank with three security checkpoints.

DDoS Protection is the crowd-control barrier on the street. If a thousand people rush the building at once to block the entrance, the barrier absorbs the crowd so legitimate customers can still walk in.

Azure Firewall is the security desk in the lobby. It checks every person’s purpose: “Are you here to visit the vault? Denied. Are you here for a bank account? Proceed to floor 2.”

WAF is the teller window’s bulletproof glass. Even if someone gets inside, the glass stops them from reaching through and grabbing cash — it blocks specific attack techniques targeting the teller (the web application).

Each checkpoint stops a different type of threat. You need all three.

Azure provides defence-in-depth for network security through three complementary services. Azure DDoS Protection absorbs volumetric attacks that try to overwhelm resources with sheer traffic volume. Azure Firewall provides centralized, stateful inspection of all network traffic flowing through your virtual networks. Web Application Firewall (WAF) inspects HTTP/HTTPS requests to web applications and blocks common exploits like SQL injection and cross-site scripting.

Each service operates at a different layer: DDoS at the network edge, Firewall at the virtual network level, and WAF at the application layer. Together they form a layered defence aligned with Zero Trust principles.

Azure DDoS Protection

A Distributed Denial of Service (DDoS) attack floods your resources with so much traffic that legitimate users cannot get through. Imagine millions of fake phone calls jamming a company’s switchboard — real callers get a busy signal.

Azure provides two tiers of DDoS protection:

FeatureDDoS Infrastructure ProtectionDDoS Protection
CostFree, automatic for all Azure servicesPaid, enabled per virtual network
Protection levelBasic threshold-based mitigationAdvanced adaptive tuning per application
MonitoringNo per-customer telemetryReal-time attack metrics and diagnostics
AlertsNoneConfigurable alerts during attacks
Cost protectionNoneCredits for resource scale-out during attacks
Rapid ResponseNot includedAccess to the DDoS Rapid Response team

Key exam point: DDoS Infrastructure Protection is always on for every Azure resource at no extra cost. DDoS Protection adds application-specific tuning, telemetry, and cost guarantees.

💡 Scenario: Alex defends SecureBank from a DDoS flood

SecureBank’s online banking portal suddenly receives 50x its normal traffic volume. The attack is coming from thousands of compromised devices worldwide.

With DDoS Infrastructure Protection (free): Azure’s global network absorbs common volumetric attacks automatically. Basic mitigation kicks in, but there’s no visibility into attack specifics and no custom tuning for SecureBank’s traffic patterns.

With DDoS Network Protection (paid): Azure has already learned SecureBank’s normal traffic profile. It detects the anomaly within seconds, applies per-application mitigation policies, sends Alex an alert with attack telemetry, and SecureBank is covered for any auto-scaling costs caused by the attack.

Alex reports to Director Reyes: “The attack peaked at 12 Gbps. DDoS Protection absorbed it without any user impact. Here’s the full diagnostic report.”

Azure Firewall

Azure Firewall is a cloud-native, fully managed, stateful firewall that protects your Azure virtual network resources. “Stateful” means it tracks the full context of a connection — not just individual packets.

What Azure Firewall does

  • Centralised network traffic filtering — one set of rules across all your virtual networks, instead of managing rules on every individual resource
  • Threat intelligence-based filtering — automatically blocks traffic from known malicious IP addresses and domains, updated by Microsoft’s threat intelligence feed
  • Application rules — allows or denies outbound traffic to specific domain names (for example, allow access to *.microsoft.com but block social media)
  • Network rules — filters traffic based on source/destination IP, port, and protocol
  • Built-in high availability — no load balancers needed, Azure manages the infrastructure
  • DNAT (Destination NAT) — translates inbound traffic to private IP addresses in your virtual network

Azure Firewall vs NSGs — what’s the difference?

AspectAzure FirewallNetwork Security Groups (NSGs)
ScopeEntire virtual network (centralised)Individual subnet or network interface
Threat intelligenceYes — blocks known malicious IPs/domainsNo
Application-layer filteringYes — can filter by domain name (FQDN)No — IP and port only
StatefulnessFully statefulStateful
CostPaid serviceFree
Use caseCentralised enterprise traffic controlBasic allow/deny rules per resource

Think of it this way: NSGs are the door locks on individual rooms. Azure Firewall is the security desk that controls who enters the building.

💡 Exam tip: Azure Firewall exam patterns

When the exam asks about centralised network filtering or threat intelligence-based filtering, the answer is Azure Firewall.

When the exam asks about filtering traffic to a specific subnet or NIC, the answer is usually NSGs.

When the question mentions FQDN (domain name) filtering for outbound traffic — Azure Firewall. NSGs cannot filter by domain name.

Web Application Firewall (WAF)

WAF sits in front of your web applications and inspects every HTTP/HTTPS request for malicious patterns. It protects against the OWASP Top 10 — the ten most critical web application security risks, including:

  • SQL injection — attacker inserts database commands into input fields
  • Cross-site scripting (XSS) — attacker injects malicious scripts into web pages viewed by other users
  • Request smuggling, HTTP floods, bot attacks

Where WAF is deployed

WAF is not a standalone service — it runs on top of these Azure services:

Deployment optionBest for
Azure Application GatewayProtecting web apps in a single Azure region
Azure Front DoorProtecting globally distributed web apps with CDN and load balancing
Azure Front DoorGlobal edge protection for applications and APIs

WAF modes

  • Detection mode — logs malicious requests but does not block them (good for testing rules)
  • Prevention mode — actively blocks detected attacks

Comparing all three: DDoS vs Firewall vs WAF

Three layers of Azure network defence — each stops different threats
FeatureDDoS ProtectionAzure FirewallWAF
Threat typeVolumetric floods (overwhelm with traffic)Network-level threats (unauthorized traffic flows)Web application exploits (SQL injection, XSS)
OSI layerLayer 3/4 (network/transport)Layer 3/4/7 (network through application)Layer 7 (application)
What it protectsAzure resources from being overwhelmedVirtual network traffic (inbound and outbound)Web applications from targeted attacks
AnalogyCrowd-control barrierBuilding security deskBulletproof teller window
DeploymentPer virtual networkCentralised in a hub VNetOn Application Gateway or Front Door
Managed byAzure platform (auto-tuned)Admin defines rulesAdmin selects rule sets (OWASP)

🎬 Video walkthrough

🎬 Video coming soon

Azure Network Defence — DDoS, Firewall & WAF Explained (SC-900)

Azure Network Defence — DDoS, Firewall & WAF Explained (SC-900)

~10 min

Flashcards

Question

What are the DDoS protection tiers in Azure?

Click or press Enter to reveal answer

Answer

1) DDoS Infrastructure Protection — free, always on, basic mitigation. 2) DDoS IP Protection — paid per public IP, adds adaptive tuning and diagnostics. 3) DDoS Network Protection — paid per protection plan, adds cost protection credits and DDoS Rapid Response team access.

Click to flip back

Question

What makes Azure Firewall different from NSGs?

Click or press Enter to reveal answer

Answer

Azure Firewall provides centralised network filtering across an entire virtual network with threat intelligence, FQDN-based filtering, and DNAT. NSGs provide basic allow/deny rules at the subnet or NIC level using IP addresses and ports only. Think: Firewall = building security desk, NSGs = room door locks.

Click to flip back

Question

What does WAF protect against, and where is it deployed?

Click or press Enter to reveal answer

Answer

WAF protects web applications against OWASP Top 10 exploits like SQL injection, XSS, and HTTP floods. It is deployed on Azure Application Gateway (regional) or Azure Front Door (global). It operates at Layer 7 (application layer).

Click to flip back

Question

What are the two WAF modes?

Click or press Enter to reveal answer

Answer

Detection mode: logs malicious requests but allows them through (for testing). Prevention mode: actively blocks detected attacks. Always start with Detection mode to avoid blocking legitimate traffic by mistake.

Click to flip back

Knowledge check

Knowledge Check

SecureBank's online banking portal is experiencing a massive traffic flood from thousands of IP addresses worldwide. The portal is becoming unreachable for real customers. Alex needs an Azure service that automatically absorbs this attack. Which service should Alex prioritise?

Knowledge Check

James, the SOC lead at SecureBank, wants to ensure all outbound traffic from the company's Azure virtual network is filtered — specifically, he wants to block employees from accessing social media domains while allowing access to Microsoft services. Which Azure service is best suited for this requirement?

Knowledge Check

A penetration test reveals that SecureBank's customer-facing web application is vulnerable to SQL injection attacks. Which Azure service should Alex deploy to protect the application from these specific attacks?

← Previous

PIM and Identity Protection

Next →

Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.