安全中心中针对具有高风险入站端口规则的任何VM的建议 [英] Recommendations in Security Center for any VM that has risky Inbound port rules

查看:89
本文介绍了安全中心中针对具有高风险入站端口规则的任何VM的建议的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

是否有任何安全中心建议标记对因特网开放的入站端口规则(如ssh等)可能会带来安全风险? 

Is there any Security Center recommendation that flags Inbound port rules that are open to the Internet like ssh, etc., that may pose a security risk? 

I我正在通过安全中心进行梳理,也许我忽视了标记这一点的建议。

I'm combing through Security Center and perhaps I'm overlooking the recommendation that does flag this.

Thx

推荐答案

您好JuniorRW, 

Hi JuniorRW, 

您可以继续限制端口访问权限SSH通过NSG并允许特定IP访问SSH端口。 

You can go ahead and restrict the port access to SSH via NSG and allow specific IPs to access SSH port. 

编写脚本以修改NSG以允许您的公共IP地址连接到您的虚拟机,并再次发布工作阻止SSH访问。 

Write a script to modify your NSG to allow your Public IP address before connecting to your VM, and post your work block the SSH access again. 

示例脚本:  http:// www。 fhtino.it/blog/workaround-for-connecting-ssh-source-ip-protected-vm-from-azure-cloud-shell

Sample Script: http://www.fhtino.it/blog/workaround-for-connecting-ssh-source-ip-protected-vm-from-azure-cloud-shell

问候, 

Msrini


这篇关于安全中心中针对具有高风险入站端口规则的任何VM的建议的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆