The Zero Trust security model is a framework that promotes the idea of “never trust, always verify” when it comes to access to resources within an organization’s network. It assumes that all users and devices, whether inside or outside the network, should be treated as untrusted and should be required to prove their identity and the legitimacy of their actions before being granted access to resources.
In the context of Azure Virtual Desktop (AVD), the Zero Trust model can be implemented using a combination of Microsoft Services and 3rd Party firewall.
Azure AD can be used to establish user identity and enforce access controls, while Azure AD Identity Protection can be used to monitor for suspicious activity and alert administrators of potential threats, also some other azure services that can be leveraged to improve security in virtual desktop environments.
By implementing the Zero Trust model in AVD, organizations can significantly reduce the risk of unauthorized access to their virtual desktop resources and ensure that only authorized users are able to access sensitive data.
There are several built-in roles for use with Azure Virtual Desktop which is a collection of permissions. To control user access in Azure Virtual Desktop (AVD) sessions, you can follow these steps:
Here is a table of some RBAC roles that are available for managing and controlling Azure Virtual Desktop (AVD):
Role | Description |
Desktop Virtualization User | Allows users to connect to AVD sessions, use applications and resources in the sessions, and perform some basic management tasks such as resetting their own password or updating their profile. |
Desktop Virtualization User Session Operator | allows users to send messages, disconnect sessions, and use the “logoff” function to sign sessions out of the session host. However, this role doesn’t let users perform session host management like removing session host, changing drain mode, and so on. This role can see assignments but can’t modify admins. |
Desktop Virtualization Host Pool Contributor | allows users to manage all aspects of host pools, including access to resources. You’ll also need the Virtual Machine Contributor role to create virtual machines. You will need Desktop Virtualization Application Group Contributor and Desktop Virtualization Workspace Contributor roles to create host pools using the portal, or you can use the Desktop Virtualization Contributor role. |
Desktop Virtualization Contributor | allows users to manage all aspects of the deployment. However, it doesn’t grant users access to compute resources. You’ll also need the User Access Administrator role to publish application groups to users or user groups. |
Desktop Virtualization Reader | allows users to view everything in the deployment but doesn’t let them make any changes. |
Desktop Virtualization Power On Off Contributor | allows the Azure Virtual Desktop Resource Provider to start and stop virtual machines. |
Desktop Virtualization Virtual Machine Contributor | allows the Azure Virtual Desktop Resource Provider to create, delete, update, start, and stop virtual machines. |
By following these steps, you can restrict access to the session hosts and ensure that only authorized users are able to log in. This can help to prevent unauthorized access to the session hosts and protect your data.
The latest upgrade to Microsoft Azure Virtual Desktop (AVD) now allows users to access the service through single sign-on (SSO) and passwordless authentication. This feature is currently in public preview and can be enabled with Azure AD. Additionally, users can utilize Windows Hello and security devices like FIDO2 keys for passwordless authentication, as explained by Microsoft’s David Belanger in a recent blog post.
Note: These features are currently in preview and only available on on Windows 11 22H2 Enterprise Preview (mono and multi session) X64 Gen 2 as session host
Note that you need to make sure that you are using the correct version of Windows and RDP properties to enable these features on AVD.
For more information check:
To control device redirection and Remote Desktop Protocol (RDP) properties for Azure Virtual Desktop (AVD), you can follow these steps:
You can centrally set Remote Desktop Protocol (RDP) properties in Azure Virtual Desktop to control how connections behave. These properties include options for device redirection, display settings, session behavior, and more. For further details, refer to the documentation on customizing RDP properties for a host pool.
To configure RDP properties in the Azure portal:
Also, you can open the Advanced tab and add your RDP properties in a semicolon-separated format like the below.
For more information, see Supported RDP properties with Azure Virtual Desktop – Azure Virtual Desktop | Microsoft Learn
By following these steps, you can control device redirection and RDP properties for AVD. This can help improve the security and efficiency of your AVD environment by
To set up screen locks for idle sessions for Azure Virtual Desktop (AVD) users, you can follow these steps:
By following these steps, you can set up screen locks for idle sessions for AVD users. This can help improve the security of your AVD environment by requiring users to reauthenticate after a period of inactivity.
To create a Group Policy object (GPO) to establish maximum inactive time and disconnection policies for Azure Virtual Desktop (AVD) users, you can follow these steps:
By following these steps, you can create a GPO to set the maximum inactive time and session end policies for AVD users. This can help improve the security and efficiency of your AVD environment by limiting the amount of time that users can be inactive or disconnected before their sessions are terminated.
Azure Virtual Desktop currently doesn’t support external identities, you could think about creating user account in your AD for External identities with limited access to separated AVD Resources
When deploying Session host (virtual machines) in Microsoft Azure, they are not enabled with Bitlocker by default. To address this issue and comply with corporate security policies, Azure Disk Encryption (ADE) can be utilized. ADE provides volume encryption for Azure VMs through the use of Bitlocker or DM-Crypt.
As there is no TPM present, ADE requires a secret for encrypting data. This secret is obtained from Azure Key Vault, a cloud-based service for securely storing and accessing secrets. To ensure the protection of this secret, a key can be generated from Azure Key Vault or brought in from an external hardware security module (HSM) device. we will explore the configuration of both services to encrypt a Windows Azure VM.
Note that you need to provide a unique name and choose the right subscription, location and resource group to create a vault on Azure.
For the prerequisites and registering Azure Files account in your data catalog, follow these steps: https://learn.microsoft.com/en-us/azure/purview/register-scan-azure-files-storage-source#prerequisites
For more details check this article: https://learn.microsoft.com/en-us/azure/purview/register-scan-azure-files-storage-source
To control how users copy and transfer data on Azure Virtual Desktop (AVD), you can follow these steps:
By following these steps, you can control how users copy and transfer data on AVD. This can be particularly useful for preventing unauthorized data transfers or for limiting the amount of data that users can copy and paste between the session hosts and their local devices.
To restrict access to local and remote drives on user sessions, you can follow these steps:
By following these steps, you can restrict access to local and remote drives on user sessions, helping to improve the security and efficiency of your environment. This can be particularly useful for preventing unauthorized access to data on the local or remote drives or for limiting the amount of data that users can access on these drives.
To use screen capture protection on Azure Virtual Desktop, you must use one of the following clients:
It is important to use the correct client to access screen capture protection feature on Azure Virtual Desktop.
To configure screen capture protection on Azure Virtual Desktop follow the below steps
Windows Defender Application Control is a way to whitelist applications and DLLs on your Windows 10 Professional and Enterprise environments.
To implement Windows Defender Application Control using Microsoft Mobile Device Management (Intune) on Azure Virtual Desktop (AVD) session hosts, you can follow one of these steps:
NOTE: Only Windows components, Microsoft store apps, and reputable apps as defined by the Intelligent Security Graph will be allowed to run
By deploying WDAC policies following highlighted steps, you can effectively implement Windows Defender Application Control on your AVD session hosts, helping to protect against malware and other threats by controlling which applications are allowed to run on the virtual desktop resources. This can help improve the security and stability of your AVD environment.
Here is a table of some example Network Security Group (NSG) rules for inbound and outbound traffic in Azure Virtual Desktop (AVD):
Rule name | Direction | Protocol | Port range | Source (inbound) or Destination (outbound) | Description |
Azure Services traffic | Outbound | TCP | 443 | Azure services | Allows outgoing traffic from AVD session hosts and host pools to Azure services over ports 80 and 443. This is necessary for AVD host resources to access Azure resources and services, such as Azure Monitor or Azure Log Analytics. |
Management traffic | Inbound | TCP | 3389 | Management subnet | Allows incoming RDP traffic from the management subnet to AVD session hosts and host pools over port 3389. This is necessary for administrators to connect to AVD host resources for management and maintenance purposes. |
Windows Update traffic | Outbound | TCP | 80, 443 | Microsoft Update services | Allows outgoing traffic from AVD session hosts and host pools to Microsoft Update services over ports 80 and 443. This is necessary for AVD host resources to receive updates and patches from Microsoft. |
File and printer sharing | Outbound | TCP | 139, 445 | File share and printer Network | Allows outgoing File and Printer Sharing traffic to AVD session hosts and host pools over ports 139 and 445. This is necessary for users to access shared files and printers on AVD host resources. |
Internet browsing traffic | Outbound | TCP | 80, 443 | Internet | Allows outgoing traffic from AVD session hosts and host pools to the internet for internet browsing purposes over ports 80 and 443. This is necessary for users to access internet resources and services from AVD host resources. |
Management traffic | Inbound | TCP | 22 | Management subnet | Allows incoming Secure Shell (SSH) traffic from the management subnet to AVD session hosts and host pools over port 22. This is necessary for administrators to connect to AVD host resources for management and maintenance purposes using SSH. |
These are just a few examples of NSG rules that may be necessary for AVD. You can customize the NSG rules for your AVD environment to meet your specific security and networking requirements.
To use internal firewalls and User Defined Routes (UDRs) for Azure Virtual Desktop (AVD) users, you can follow these steps:
By following these steps, you can use internal firewalls and UDRs for AVD users, helping to improve the security and connectivity of your virtual desktop environment. The internal firewalls can help to block unwanted traffic, while the UDRs can help to route traffic as desired. This can be particularly useful for connecting AVD users to on-premises resources or for segmenting the virtual desktop network.
Here is a table of some firewall policies that can be applied to control Azure Virtual Desktop (AVD) host sessions and user access:
Policy name | Description | |
Block incoming connections | Blocks all incoming connections to AVD host resources, such as session hosts and host pools, except those that are explicitly allowed. This can help to prevent unauthorized access and protect against security threats. | |
Allow outgoing connections | Allows all outgoing connections from AVD host resources, such as session hosts and host pools, except those that are explicitly blocked. This can help to ensure that the resources can communicate with other resources and services as needed. | |
Allow specific incoming IPs | Allows incoming connections to AVD host resources, such as session hosts and host pools, from specific IP addresses or ranges. This can help to allow connections from trusted sources, while blocking connections from untrusted sources. | |
Allow specific outgoing domains | Allows outgoing connections from AVD host resources, such as session hosts and host pools, to specific domains. This can help to allow access to certain websites or services, such as business or education sites, while blocking access to other websites or services. | |
Allow specific outgoing IP addresses | Allows outgoing connections from AVD host resources, such as session hosts and host pools, to specific IP addresses. This can help to allow access to certain devices or locations, such as business partners or trusted networks, while blocking access to other devices or locations. |
By implementing these firewall policies, you can further control user internet access on your AVD host resources. This can help to meet compliance requirements, prevent the use of unauthorized or inappropriate websites or services, and protect against security threats.
You might need to create more Azure Firewall applications and network rules when you want to allow users outbound internet access.
If you have a well-defined list of allowed destinations, like Microsoft 365, use Azure Firewall application and network rules to route end-user traffic directly to the destinations. For information about the Office 365 IP address and URL web service, see the resources listed at the end of this module: you can refer to this link for the mandatory rules to allow outbound access to the control plane and core dependent services: https://learn.microsoft.com/en-us/azure/firewall/protect-azure-virtual-desktop?tabs=azure#host-pool-outbound-access-to-azure-virtual-desktop
To configure Azure Bastion and just-in-time (JIT) for administrative access to Azure Virtual Desktop (AVD) session hosts, you can follow these steps:
You can scope these roles at whatever level you want:
By following these steps, you can configure Azure Bastion and JIT for administrative access to AVD session hosts, allowing authorized users to remotely manage and troubleshoot the virtual desktop resources. This can help improve the security and efficiency of your AVD environment.
To use Azure Policy built-in definitions to configure the diagnostics settings for Azure Virtual Desktop (AVD) resources like workspaces, application groups, and host pools, you can follow these steps:
By following these steps, you can use Azure Policy built-in definitions to configure the diagnostics settings for AVD resources. This can help to improve the monitoring and troubleshooting of your virtual desktop environment by ensuring that the appropriate diagnostics data is collected and stored. You can use the Azure Policy service to automate the configuration of the diagnostics settings and ensure that they are consistently applied across your AVD resources.
Here is a table of some Azure policies that can be applied to Azure Virtual Desktop (AVD):
Policy name | Description | |
Enable MFA | Accounts with write permissions on Azure resources should be MFA enabled | |
Restrict public IPs for AVD hosts | AVD host network interfaces should not have public Ips,This can help to prevent unauthorized access and protect against security threats. | |
Require AVD session host tags | Requires that all AVD session host resources, such as session hosts and host pools, have specific tags applied to them. This can help to ensure that the resources are properly classified and managed. | |
Enable endpoint protection | Install Endpoint Protection installed on all AVD session host resources, such as session hosts, DCs and Azure VMs for AVD Apps. | |
Enforce AVD network, security groups | Enforces the use of network security groups (NSGs) on AVD resources to control inbound and outbound network traffic. This can help to prevent unauthorized access and protect against security threats. | |
Enforce AVD encryption | Enforces the use of encryption on AVD resources, such as session hosts and data disks to protect sensitive data. This can help to meet compliance requirements and prevent data leaks. | |
Require AVD security updates | Requires the application of security updates on AVD resources, such as session hosts, to keep the resources up-to-date and protect against security vulnerabilities. | |
Block AVD resource deletion | Blocks the deletion of AVD resources, such as session hosts and host pools, unless they meet specific criteria. This can help to prevent the accidental or unauthorized deletion of resources and ensure that they are properly managed. |
By implementing these Azure policies, you can improve the security, compliance, and management of your AVD environment. You can use the policies to enforce organizational policies, prevent unauthorized access and resource deletion, and ensure that your AVD resources meet the required standards.
To use Microsoft Defender for Cloud to apply extra compliance standards to Azure Virtual Desktop (AVD), you can follow these steps:
If you want to disable any of the plans, turn the plan off. The extensions used by the plan are not uninstalled but, after a short time, the extensions stop collecting data.
By following these steps, you can use Microsoft Defender for Cloud to apply extra compliance standards to AVD. Microsoft Defender for Cloud can help to ensure that your virtual desktop environment meets various compliance requirements, such as those related to security, data protection, and governance. This can be particularly useful for meeting regulatory requirements or for demonstrating compliance to customers or partners.
To improve the Microsoft Defender Secure Score for Azure Virtual Desktop (AVD), you can follow these steps:
By following these steps, you can improve the Microsoft Defender Secure Score for AVD. The Secure Score is a composite score that reflects the security posture of your AVD environment, taking into account various factors such as identity protection, data protection, device security, and more. By implementing the Secure Score recommendations, you can help to improve the overall security posture of your AVD environment and increase the Secure Score.
Here is a table of some recommendations for Microsoft Defender for Cloud that can be applied to Azure Virtual Desktop (AVD) host sessions:
Recommendation | Description |
Compute | Recommendations to Protect the data on your Azure virtual machines with Azure Backup, and remediate vulnerabilities in security configuration on machines to protect them from attacks. |
Security posture | Recommendations for improving the overall security posture of AVD host sessions, such as enabling additional security features, configuring security policies, and applying software updates. |
Network security | Recommendations for improving the network security of AVD host sessions, such as configuring network security groups, enabling firewall rules, and implementing virtual private networks (VPNs). |
Application security | Recommendations for improving the application security of AVD host sessions, such as configuring application control policies, enabling application whitelisting, and disabling unwanted applications. |
Data security | Recommendations for improving the data security of AVD host sessions, such as enabling data encryption, configuring data access controls, and implementing data backup and recovery strategies. |
Compliance and governance | Recommendations for improving the compliance and governance of AVD host sessions, such as configuring auditing and monitoring settings, applying compliance standards, and implementing governance policies. |
For the lists the recommendations you might see in Microsoft Defender for Cloud check this link: https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference
There are many compliance standards that can be applied to Azure Virtual Desktop (AVD). Here is a table of some examples:
Compliance standard | Description |
ISO 27001 | International standard for information security management, covering the security of information assets such as financial data, intellectual property, and personal data. |
PCI DSS | Payment Card Industry Data Security Standard, covering the security of cardholder data and the requirements for merchants and service providers to accept and process payment card transactions. |
HIPAA | Health Insurance Portability and Accountability Act, covering the protection of sensitive medical information. |
NIST Cybersecurity Framework (CSF) | National Institute of Standards and Technology Cybersecurity Framework, covering the management of cybersecurity risk in the context of an organization’s risk management strategy. |
SOC TSP | SOC 2 Reporting and the Trust Services Principles (TSP). SOC 2 Type 2 Compliance entails the use of what’s known as the Trust Services Principles (TSP) – a set of professional attestation and advisory services containing essential criteria-based information for assessing service organizations. |
Azure CIS | The CIS Microsoft Azure Foundations Benchmark is the security guidance provided by the Center for Internet Security for establishing a secure baseline configuration for Azure. The scope of the benchmark is to establish the foundation level of security while adopting Azure Cloud. |
FedRAMP | Federal Risk and Authorization Management Program, covering the security requirements for cloud service providers serving the US federal government. |
By applying one of these compliance standards to AVD based on business needs, you can ensure that your AVD environment meets the requirements for data security, privacy, and compliance. This can help to protect sensitive information and meet the regulatory requirements of your industry or organization.
For the full list of compliance standards are available in Defender for Cloud check this link: https://learn.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages#what-regulatory-compliance-standards-are-available-in-defender-for-cloud
To prevent unwanted software from running on session hosts, you can follow these steps:
By following these steps, you can prevent unwanted software from running on session hosts, helping to improve the security and stability of your environment. This can be particularly useful for preventing malware or unauthorized software from running on the session hosts.
Here is a PowerShell script that you can use Deploy the Trusted Launch on Azure Virtual Desktop (AVD) session hosts:
By following these steps, you can enable Trusted Launch for AVD session hosts, helping to improve the security of your virtual desktop environment. Trusted Launch helps to Securely deploy virtual machines with verified boot loaders, OS kernels, and drivers, securely protect keys, certificates, and secrets in the virtual machines, Gain insights and confidence of the entire boot chain’s integrity and Ensure workloads are trusted and verifiable.
Here is a PowerShell script that you can use to enable and install Microsoft Defender for Cloud on Azure Virtual Desktop (AVD) session hosts:
To use this script, you will need to replace the following placeholders with your own values:
To apply OS and application updates to an image, you can follow these steps:
By following these steps, you can apply OS and application updates to an image, ensuring that the image is up to date and fully patched. This can help ensure that the image is secure and reliable when deployed in production.
Azure Monitor and Log Analytics are tools that can be used to monitor and troubleshoot Azure Virtual Desktop (AVD) environments.
Azure Monitor is a service that provides real-time monitoring and alerting for Azure resources. It allows administrators to view metrics, logs, and alerts for AVD resources, as well as set up custom alerts and notifications based on specific conditions.
Log Analytics is a service that enables administrators to collect and analyze log data from AVD resources and other Azure services. It provides a searchable repository of data that can be used to identify trends, detect issues, and generate reports.
Together, Azure Monitor and Log Analytics provide a powerful toolset for monitoring and troubleshooting AVD environments. They can be used to identify performance issues, track resource usage, and detect security threats, among other things.
To use Azure Monitor and Log Analytics for AVD, administrators can:
By using Azure Monitor and Log Analytics for AVD, administrators can gain visibility into the performance and health of their virtual desktop environment and proactively identify and resolve issues.
To create a Log Analytics workspace and enable AVD insights to collect the logs, you can follow these steps:
Here are some additional points for advanced configuration of AVD insights:
By configuring these advanced features, you can improve the capabilities and usefulness of AVD insights for monitoring and analyzing your AVD environment. These features can help you to better understand the usage patterns and performance of your AVD environment, as well as to identify and respond to potential issues or problems.
Here is a table of all the audit logs that can be collected for Azure Virtual Desktop (AVD):
Log name | Description |
WVDConnections | Records information about user connections to AVD, including the user’s identity, the connection method, and the session ID. |
WVDSessionHostManagement | Windows Virtual Desktop session host management data, The source for the Azure virtual machine – either Marketplace or Custom, The desired Azure virtual machine size (e.g.: Standard_D2s_v4) after the host pool update. |
WVDAgentHealthStatus | Azure Virtual Desktop agent health status data like The number of disconnected, or logged off sessions on the VM, The version of the WVD Agent running on the Virtual Machine |
WVDErrors | Windows Virtual Desktop Error Activity, like the user for which the error happened, The source of the error. |
WVDFeeds | Windows Virtual Desktop Feed Activity, like the remote IP address from the client side, Client Type, Client Version |
WVDManagement | Windows Virtual Desktop Management Activity, like the user that initiated the management request and the remote IP address from the client side. |
WVDHostRegistrations | Windows Virtual Desktop Host Registration Activity, like the name and IP address of the session host that was registered with the WVD service. |
To create and configure alerts for Azure Virtual Desktop (AVD), you can follow these steps:
By following these steps, you can configure alerts and automated responses in Microsoft azure to ensure the overall compliance of AVD.
There are many alerts that can be applied to Azure Virtual Desktop (AVD) to monitor the health and performance of your environment. Here is a table of some examples:
Alert type | Description | |
Session host status | Triggers an alert when a session host goes offline or experiences a problem. | |
User connection | Triggers an alert when a user experiences a problem connecting to an AVD session, such as a failed login attempt. | |
Resource usage | Triggers an alert when a resource, such as CPU or memory, reaches a certain threshold. | |
Application usage | Triggers an alert when an application is used in an unusual way, such as a sudden increase in usage or an unusual error. | |
Security breach | Triggers an alert when a security breach is detected, such as unauthorized access to an AVD resource. | |
Compliance violation | Triggers an alert when a compliance violation is detected, such as the unauthorized access of sensitive data. | |
System update failure | Triggers an alert when a system update fails, indicating that the update may need to be reattempted. | |
Performance degradation | Triggers an alert when the performance of an AVD resource, such as a session host, begins to degrade. | |
Application error | Triggers an alert when an application error is detected, indicating that the application may need to be troubleshooted. | |
Network connectivity issue | Triggers an alert when a network connectivity issue is detected, indicating that users may be unable to connect to AVD sessions. | |
Resource exhaustion | Triggers an alert when a resource, such as CPU or memory, becomes exhausted, indicating that additional resources may be needed. | |
User session termination | Triggers an alert when a user session is terminated, indicating that the session may need to be investigated. | |
Resource quota exceeded | Triggers an alert when a resource quota is exceeded, indicating that additional resources may be needed. |
By configuring these additional alerts, you can further enhance the monitoring and management of your AVD environment. You can use the alerts to identify and respond to potential issues or problems, ensuring that your AVD environment is operating smoothly and efficiently. You can also use the alerts to meet compliance requirements, such as by triggering an alert when a security breach is detected.
Azure Sentinel is a cloud-native, security information and event management (SIEM) platform that helps organizations detect and respond to threats in real-time. It can be used to monitor and protect Azure Virtual Desktop (AVD) environments by collecting, analyzing, and storing data from a variety of sources, including logs from AVD resources, Azure AD, and Azure Defender.
Data Type | Action |
Windows event logs | To stream Windows event logs from the Azure Virtual Desktop environment into a Microsoft Sentinel-enabled Log Analytics workspace, install the Log Analytics agent on your Windows machine and set it up to send the Windows event logs to the workspace. This process is similar to how event logs from other Windows machines are sent to Log Analytics workspaces. You can refer to the previous section on how to collect your AVD Log using LAW |
Microsoft Defender for Endpoint alerts | The procedure for setting up Defender for Endpoint on an Azure Virtual Desktop is the same as for any other Windows endpoint. For additional guidance, refer to the resources on setting up a Microsoft Defender for Endpoint deployment and connecting data from Microsoft 365 Defender to Microsoft Sentinel. – Set up Microsoft Defender for Endpoint deployment |
Azure Virtual Desktop diagnostics | Azure Virtual Desktop diagnostics is a built-in feature that logs activity when an individual with an assigned Azure Virtual Desktop role uses the service. These logs include information about the Azure Virtual Desktop role involved in the activity, error messages that occurred during the session, tenant and user details. The diagnostics feature also logs both user and administrative actions. |
To push Azure Virtual Desktop data into Microsoft Sentinel, follow the guidance provided in the earlier section (Create Log analytics and enable AVD insights to collect the logs).
Microsoft MVP | Speaker | Azure Service Delivery Lead at Bespin Global MEA, helping customers build successful Azure practices. Talks about #AzureCloud and #AI
In this session, we will explore the architecture and best practices for building secure and…
Introduction Welcome to our comprehensive series on Azure Web Application Firewall (WAF) security! In this…
Introduction Welcome to the third installment of our Azure Web Application Firewall (WAF) Security Lab…
Introduction Welcome to the second installment of our Azure Web Application Firewall (WAF) Security Lab…
Introduction Welcome to the first installment of our four-part Azure Web Application Firewall (WAF) Security…
Introduction In today's digital landscape, protecting web applications from sophisticated attacks is crucial. Azure Web…