Azure Firewall Room for Improvement
The cost of the solution has increased.
The robustness of the software could be better. It should be able to cover host-to-host traffic or HTTP traffic.
Configurations can be better. The workloads need to still have free access.
The encryption and decryption process is not that seamless.
It's a little heavy compared to a FortiGate or other firewalls.
View full review »The threat intelligence aspect of this particular firewall is not at par with other providers. The load balancing and high availability could be better.
Something like Panorama can also be a part of this solution.
View full review »You can use Azure Firewall in every technical area. It's not branch specific, rather it's more architecture specific. Palo Alto also has firewalls that protect cloud infrastructure, but Palo Alto firewalls are fully managed by Palo Alto, giving you room to configure it more like you want to configure it. That gives you more options for manual deployment. Sometimes this works great when it comes to scaling or performance and can be an advantage. It depends on the use case. The option for doing a more manual deployment with Azure Firewall should be improved.
It doesn't always fit our requirements and we have to configure it further.
Also, Azure has new versions including a premium firewall. But I would like to see them not put the premium features on Azure Firewall Premium alone because it is quite expensive. For example, we use intrusion detection and prevention systems but only mTLS (Mutual TLS) inspection, which is not in the standard Azure Firewall, but it is in the premium version.
High availability can also be an issue, so there are several reasons to go for the premium version, but the standard firewall is too modest. It's more for an SMB. If you want to scale you should go for Azure Firewall Premium.
View full review »Buyer's Guide
Azure Firewall
May 2024
Learn what your peers think about Azure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,292 professionals have used our research since 2012.
The development area and QA area could be improved. With those improvements, we can improve projects and take even less time to implement them.
MB
reviewer1574409
Cloud Architect at a tech services company with 10,001+ employees
I'm not sure if that is still supported because we haven't yet explored all of the features, but it was on our future roadmap to integrate all restriction traffic and anything with our ITSM tool, most likely ServiceNow. So that an auto ticket can be generated for the ingenious, remediation and fixing can be done. Any type of automation can come into play there as well. Those are on our to-do list. But we're still looking into it. It is yet to be discovered.
It would be much easier if the on-premises, firewall rules, had some kind of export-import possibility in place, which is not the case right now.
As I previously stated, the same integration, most likely ITSM tool integration, is one of those features we'd like to investigate to see if it exists or not, so we can have a more forward-thinking perspective on it.
View full review »JJ
Reviewer45205
Group Cloud Competency Center Manager at a transportation company with 10,001+ employees
It is a cloud service, but the lending speed for each region is not always the same. For example, in China, the speed is slow. They need to think about how to make sure that the service pace or speed is always the same in all regions. It would be a great improvement if they can provide the same pace worldwide.
It is still not at par with traditional next-generation firewalls. It is still behind other network and firewall vendors such as Palo Alto. There are other advanced and leading products in the market, and Azure Firewall is still a follower. So, they can consider investing more in this product and make it a market leader like Azure.
View full review »Azure Firewall should have a free trial version for new users so that they can evaluate it before deploying it.
View full review »TM
Tirumalesh M
Senior Cloud Architect at Kyndryl
An Azure firewall is not a real firewall. It has a lot of things to improve on. It should go and make a list of other firewalls and apply what they offer to its services. It requires features such as IDS, IPS, anti-virus, et cetera. The security protections on offer need to be better.
View full review »It could potentially be more cost-effective. There is room for further integration of AI into the system.
View full review »BW
reviewer1288212
Network Administrator at a government with 201-500 employees
Azure Firewall definitely needs a broader feature base. It should be able to go all the way up to layer 7 when looking at applications and things like that. It needs to be comparable to what you would get from Cisco, Palo Alto, Checkpoint, or any of those guys. If it's going to be a firewall, it needs to be competitive. From a security standpoint, it's not any better than loading an IP table in a Linux box. In fact, Linux may even be better in that sense
View full review »KI
KrishnaInfosec
Manager - Network & Security at a tech services company with 501-1,000 employees
This solution is not mature when it comes to handling perimeter traffic like internet browsing. It is lacking in some of the security features. Palo Alto and Fortinet are better for this.
In the next release, I would like to see the inclusion of more next-generation firewall features.
View full review »GT
Geo Thomas
Network Security Engineer at Diyar United Company
Compared to FortiGate and Palo Alto, Azure Firewall is not very flexible. There are multiple options for VPNs and the other features, and most of my clients are implementing third-party products that they are getting from the marketplace and other vendors.
The reporting, logging, and monitoring features, as well as the flexibility of the policies, need to be improved.
The visibility is much less with Azure Firewall than it is with other products.
View full review »For large organizations, a third-party firewall would be an added advantage, because it would have more advanced features, things that are not in Azure Firewall.
View full review »TZ
ThomasZebar
Senior Azure Solution Architect at a tech company with 10,001+ employees
It needs a lot of improvement, especially on intruder detection. They are working hard on that.
View full review »CC
Christian Cutajar
Head of IT at NetRefer
The solution doesn't offer the same capabilities of Fortinet. It should offer intrusion prevention and advance filtering. These are two very useful features offered on Fortinet that Azure lacks.
There's already a web application firewall for detection, however, it isn't as useful as it could be. They should work to improve it.
In terms of prevention, I don't think it's any better than just a regular firewall. They need to add more security features to make it more powerful and more secure.
View full review »DL
reviewer1577409
Technical Architect at a tech services company with 10,001+ employees
It would be nice to be able to create groupings for servers and offer groups of IP addresses.
I would, also, like to see the manager built into the solution more, such as concerns Azure Firewall Manager.
I would also like to see some of the items that come with the preview version for the next version with IDS be addressed, as well as the ability to categorize websites, which is done with external traffic.
The interface could be improved, it's not very user friendly. They are now trying to compete with a new Chinese domestic public cloud provider which has more features. It's difficult to find the ports on the current interface, but it's easier with this new provider.
We're looking to provide a better routing, or something like an SD-WAN solution that can improve the user experience. I think that's something Azure can do as an additional feature. There are five Azure clouds: Two belong to the US government and one is worldwide. Then there is Germany Azure and China Azure. China Azure is barely able to communicate with the rest of the world, and that connectivity issue needs to be looked at in detail and a solution found.
The solution should incorporate features similar to competitors like split tunneling.
View full review »RH
reviewer1651275
Senior Security Operations and Cyber Risk Analyst at a financial services firm with 51-200 employees
We had an instance where it wasn't processing the rules and we had to engage Microsoft to resolve that issue. Microsoft Support needs to improve its response time.
For larger enterprises, they need to adjust the scalability. This is the only issue that I'm have found that it attributed to the two weeks of downtime we had experienced.
They need to offer either a scaled-up or scaled-out version or versions for larger enterprise companies.
This would greatly improve the solution.
View full review »JA
JasperAdolfs
Freelance Consultant at The Future Group
Rules management could be better. You have all kinds of rules, and they can put something better in place there.
There should be better monitoring and logging. Currently, it is put in Sentinel. It should be more seamless and from the interface.
View full review »DJ
reviewer896049
Cloud Architect at a financial services firm with 1,001-5,000 employees
You have to have a defined IP range within your network to associate it with your network. The problem is you have to plan ahead of time if you expect to use the firewall in the future so that you don't have to reconfigure your subnets or that specific IP range. Other than that, I don't any issues. I use it for basic configuration for a single application, so I really don't try to leverage it for multiple applications where I might find some complexity or challenges.
View full review »MA
Mohammed Alahdal
Cyber Security architect at Avanade
In terms of features, it is great, but it has fewer features than you can get from other firewalls, like anti-spam and anti-phishing. Those kinds of things are not included. It only includes IDS and IDB.
View full review »CF
reviewer2315676
Cloud Architect at a computer software company with 1,001-5,000 employees
The tool needs to improve the onboarding and transition process for on-prem users.
View full review »RK
Rajneesh Kaur
Senior Security Analyst at a tech vendor with 1,001-5,000 employees
If I had to pick one area that needs improvement it would be the antivirus functionality, because it doesn't scan traffic for malware. It needs TLS inspection.
View full review »DL
reviewer1573551
Network Engineer at a leisure / travel company with 10,001+ employees
In terms of what could be improved, it lacks a couple of features which are available in the other marketplace products, but it is stable and it performs most of the basic functions that are expected from a normal firewall.
When we deployed we did not have a centralized management of multiple firewalls. Right now, with Azure Firewall, we cannot have a normal inbound traffic flow. For inbound, Microsoft suggests using application gateways, so the options are very limited. I cannot use this firewall as an intermediate firewall because of the limitations, and I cannot point routing to another firewall. So if I want to use back-to-back firewall architecture in my environment, I cannot use Azure Firewall for that type of configuration either.
Other features I would like to see are intrusion prevention, URL filtering, category-based URL filtering and other advanced features.
Overall, the configuration can definitely be improved.
In terms of the overall product architecture, if the management and the architecture of the product could support back-to-back firewall architectures so that I could use Azure Firewall in combination with another firewall, that would be one point which would help this product be used more and in a better way.
Again, if the Azure Firewall could be accommodated as a back-to-back firewall, meaning if it could work as a firewall which handles the inbound traffic from the internet, which is an NVA, or a network virtual appliance, and we could reroute the traffic to Azure Firewall, that would be good. But as of now, there is no routing options in Azure Firewall.
SV
reviewer1404387
Cloud Architect at a pharma/biotech company with 10,001+ employees
The solution isn't missing features per se.
Azure should be able to work better as a balancer also, instead of just being a firewall. It should have a wider mandate.
There should be more use cases, specifically use cases for domains for, for example, healthcare and specific use cases for web applications.
View full review »VT
Velizar-Todorov
IT Senior Architect, Infrastructure and Cloud Solutions at a government with 501-1,000 employees
In a future release, it could be empowered by combining with Azure Private DNS and Front Door.
View full review »VJ
Vladimir Jirasek
CEO at Foresight Cyber Ltd
Currently, it only supports IP addresses, so you have to be specific about the IPs that are in your environment. They could add specific instance names, such as an instance ID to be specified or a resource group.
Tagging is supported but not on the instances, which is something that could be improved.
The selection of the internal resources into the ruleset could be improved.
Support for layer-seven application filtering should be added because it is not there yet, at all.
It is capable of filtering on the fully qualified domain name (FQDN) but it cannot do the more advanced features that Palo Alto or FortiGate can do, where you can grant or limit access to Facebook but you don't need to specify the domain name because it knows about Facebook as an application. You should be able to simply say "Allow Facebook", but also have it block Facebook Chat, for example. Having control over those specific application protocols within the traffic would be an improvement.
The documentation from Microsoft could be slightly improved, although it could be related to the fact that the product is quickly changing. It may be a case that the documentation updates are of a lower priority than the product itself.
View full review »MA
Mina Aziz
Senior System Engineer at Effvision
They can improve the pricing of Azure Firewall.
View full review »SP
Shashi Pendyala
Cloud Architect at a manufacturing company with 1,001-5,000 employees
The threat intelligence part could be better. I don't see why our customers have to get an additional solution with Azure Firewall. It would be great if they made it on par with Palo Alto.
View full review »EA
Emmanuel Auffray
Enterprise Solution Architect at a computer software company with 201-500 employees
There are a number of things that need to be simplified, but it's mostly costs. It needs to be simplified because it's pretty expensive.
AL
reviewer1222458
Consultant at a manufacturing company with 1,001-5,000 employees
I think that their customer support could be improved with a faster response time.
I think the product could be made more customizable, I'd like to see that in the next release.
Buyer's Guide
Azure Firewall
May 2024
Learn what your peers think about Azure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,292 professionals have used our research since 2012.