Skip to content

Network - 25550 - Inspection of Outbound TLS Traffic is Enabled on Azure Firewall#854

Draft
Manoj-Kesana wants to merge 3 commits intomainfrom
Feature-25550
Draft

Network - 25550 - Inspection of Outbound TLS Traffic is Enabled on Azure Firewall#854
Manoj-Kesana wants to merge 3 commits intomainfrom
Feature-25550

Conversation

@Manoj-Kesana
Copy link
Collaborator

Inspection of Outbound TLS Traffic is Enabled on Azure Firewall

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR introduces a new assessment test (Test-Assessment.25550) that verifies Azure Firewall Premium has TLS inspection properly enabled. The test checks for both global certificate authority configuration and at least one application rule with TLS inspection explicitly enabled.

Changes:

  • Added PowerShell test function to evaluate Azure Firewall Premium TLS inspection configuration
  • Added markdown documentation explaining the importance of TLS inspection for detecting threats in encrypted traffic

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 6 comments.

File Description
src/powershell/tests/Test-Assessment.25550.ps1 Implements test logic to query Azure subscriptions for Firewall Premium policies, check for transportSecurity.certificateAuthority configuration, and verify application rules have terminateTLS enabled
src/powershell/tests/Test-Assessment.25550.md Provides user-facing documentation explaining TLS inspection capabilities, security benefits, and remediation guidance with Microsoft Learn links

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +167 to +169
# Extract just the policy name from the full resource ID
$policyIdShort = ($policyInfo.PolicyId -split '/')[-1]
$policyId = Get-SafeMarkdown -Text $policyIdShort
Copy link

Copilot AI Feb 5, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The code extracts the last segment of the PolicyId resource path, which is the policy name. This is redundant since the PolicyName is already displayed in the previous column. Consider either showing the full resource ID for the "Azure Firewall policy ID" column, or removing this column entirely since it duplicates the policy name.

Suggested change
# Extract just the policy name from the full resource ID
$policyIdShort = ($policyInfo.PolicyId -split '/')[-1]
$policyId = Get-SafeMarkdown -Text $policyIdShort
$policyId = Get-SafeMarkdown -Text $policyInfo.PolicyId

Copilot uses AI. Check for mistakes.
Manoj-Kesana and others added 2 commits February 5, 2026 08:57
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
@Manoj-Kesana Manoj-Kesana marked this pull request as draft February 5, 2026 08:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant