research-hub/azure-firewall-rules/ActiveDirectory.jsonc (34 lines of code) (raw):
/*
* Azure Firewall Rule Collection for Active Directory
*/
[
{
"name": "ActiveDirectory_NW",
"priority": 150,
"ruleCollectionType": "FirewallPolicyFilterRuleCollection",
"action": {
"type": "Allow"
},
"rules": [
{
"ruleType": "NetworkRule",
"name": "DomainControllers",
"ipProtocols": ["TCP", "UDP", "ICMP"],
"sourceIpGroups": ["{{ipAddressPool}}"],
"destinationAddresses": "{{domainControllerIPAddresses}}",
"destinationPorts": [
"88", // Kerberos
"123", // NTP
"135", // RPC
"138", // NetBIOS name resolution
"389", // LDAP
"445", // SMB, SAM/LSA
"636", // LDAPS
"3268-3269", // Global Catalog
"9389", // ADWS
"49152-65535" // RCP high TCP ports
]
}
]
}
]