Azure Firewall Room for Improvement

Charan Kumar - PeerSpot reviewer
Director, Technology at a computer software company with 5,001-10,000 employees

The cost of the solution has increased.

The robustness of the software could be better. It should be able to cover host-to-host traffic or HTTP traffic.  

Configurations can be better. The workloads need to still have free access. 

The encryption and decryption process is not that seamless.

It's a little heavy compared to a FortiGate or other firewalls.

View full review »
Nawaz Ahmed. - PeerSpot reviewer
Information Technology Project Manager at Thoucentric

The threat intelligence aspect of this particular firewall is not at par with other providers. The load balancing and high availability could be better.

Something like Panorama can also be a part of this solution.

View full review »
Rene Schouten. - PeerSpot reviewer
Senior Solution Architect at Stichting Inlichtingenbureau

You can use Azure Firewall in every technical area. It's not branch specific, rather it's more architecture specific. Palo Alto also has firewalls that protect cloud infrastructure, but Palo Alto firewalls are fully managed by Palo Alto, giving you room to configure it more like you want to configure it. That gives you more options for manual deployment. Sometimes this works great when it comes to scaling or performance and can be an advantage. It depends on the use case. The option for doing a more manual deployment with Azure Firewall should be improved.

It doesn't always fit our requirements and we have to configure it further.

Also, Azure has new versions including a premium firewall. But I would like to see them not put the premium features on Azure Firewall Premium alone because it is quite expensive. For example, we use intrusion detection and prevention systems but only mTLS (Mutual TLS) inspection, which is not in the standard Azure Firewall, but it is in the premium version.

High availability can also be an issue, so there are several reasons to go for the premium version, but the standard firewall is too modest. It's more for an SMB. If you want to scale you should go for Azure Firewall Premium.

View full review »
Buyer's Guide
Azure Firewall
May 2024
Learn what your peers think about Azure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,292 professionals have used our research since 2012.
Ricardo S. - PeerSpot reviewer
IT Infrastructure Architect at a financial services firm with 10,001+ employees

The development area and QA area could be improved. With those improvements, we can improve projects and take even less time to implement them.

View full review »
MB
Cloud Architect at a tech services company with 10,001+ employees

I'm not sure if that is still supported because we haven't yet explored all of the features, but it was on our future roadmap to integrate all restriction traffic and anything with our ITSM tool, most likely ServiceNow. So that an auto ticket can be generated for the ingenious, remediation and fixing can be done. Any type of automation can come into play there as well. Those are on our to-do list. But we're still looking into it. It is yet to be discovered.

It would be much easier if the on-premises, firewall rules, had some kind of export-import possibility in place, which is not the case right now.

As I previously stated, the same integration, most likely ITSM tool integration, is one of those features we'd like to investigate to see if it exists or not, so we can have a more forward-thinking perspective on it.

View full review »
JJ
Group Cloud Competency Center Manager at a transportation company with 10,001+ employees

It is a cloud service, but the lending speed for each region is not always the same. For example, in China, the speed is slow. They need to think about how to make sure that the service pace or speed is always the same in all regions. It would be a great improvement if they can provide the same pace worldwide. 

It is still not at par with traditional next-generation firewalls. It is still behind other network and firewall vendors such as Palo Alto. There are other advanced and leading products in the market, and Azure Firewall is still a follower. So, they can consider investing more in this product and make it a market leader like Azure.

View full review »
Prateek Agarwal - PeerSpot reviewer
Manager at Indian Institute of Management Visakhapatnam

Azure Firewall should have a free trial version for new users so that they can evaluate it before deploying it.

View full review »
TM
Senior Cloud Architect at Kyndryl

An Azure firewall is not a real firewall. It has a lot of things to improve on. It should go and make a list of other firewalls and apply what they offer to its services. It requires features such as IDS, IPS, anti-virus, et cetera. The security protections on offer need to be better.

View full review »
Andrey Grozdev - PeerSpot reviewer
Cloud Consultant at Thobey

It could potentially be more cost-effective. There is room for further integration of AI into the system.

View full review »
BW
Network Administrator at a government with 201-500 employees

Azure Firewall definitely needs a broader feature base. It should be able to go all the way up to layer 7 when looking at applications and things like that. It needs to be comparable to what you would get from Cisco, Palo Alto, Checkpoint, or any of those guys. If it's going to be a firewall, it needs to be competitive. From a security standpoint, it's not any better than loading an IP table in a Linux box. In fact, Linux may even be better in that sense

View full review »
KI
Manager - Network & Security at a tech services company with 501-1,000 employees

This solution is not mature when it comes to handling perimeter traffic like internet browsing. It is lacking in some of the security features. Palo Alto and Fortinet are better for this.

In the next release, I would like to see the inclusion of more next-generation firewall features.

View full review »
GT
Network Security Engineer at Diyar United Company

Compared to FortiGate and Palo Alto, Azure Firewall is not very flexible. There are multiple options for VPNs and the other features, and most of my clients are implementing third-party products that they are getting from the marketplace and other vendors.

The reporting, logging, and monitoring features, as well as the flexibility of the policies, need to be improved.

The visibility is much less with Azure Firewall than it is with other products.

View full review »
BalamuruganSarangapani - PeerSpot reviewer
Sr. Technical Consultant - Cloud Delivery at a tech services company with 501-1,000 employees

For large organizations, a third-party firewall would be an added advantage, because it would have more advanced features, things that are not in Azure Firewall.

View full review »
TZ
Senior Azure Solution Architect at a tech company with 10,001+ employees

It needs a lot of improvement, especially on intruder detection. They are working hard on that.

View full review »
CC
Head of IT at NetRefer

The solution doesn't offer the same capabilities of Fortinet. It should offer intrusion prevention and advance filtering. These are two very useful features offered on Fortinet that Azure lacks.

There's already a web application firewall for detection, however, it isn't as useful as it could be. They should work to improve it.

In terms of prevention, I don't think it's any better than just a regular firewall. They need to add more security features to make it more powerful and more secure.

View full review »
DL
Technical Architect at a tech services company with 10,001+ employees

It would be nice to be able to create groupings for servers and offer groups of IP addresses.

I would, also, like to see the manager built into the solution more, such as concerns Azure Firewall Manager. 

I would also like to see some of the items that come with the preview version for the next version with IDS be addressed, as well as the ability to categorize websites, which is done with external traffic.

View full review »
it_user1297926 - PeerSpot reviewer
Owner at a financial services firm with 1,001-5,000 employees

The interface could be improved, it's not very user friendly. They are now trying to compete with a new Chinese domestic public cloud provider which has more features. It's difficult to find the ports on the current interface, but it's easier with this new provider. 

We're looking to provide a better routing, or something like an SD-WAN solution that can improve the user experience. I think that's something Azure can do as an additional feature. There are five Azure clouds: Two belong to the US government and one is worldwide. Then there is Germany Azure and China Azure. China Azure is barely able to communicate with the rest of the world, and that connectivity issue needs to be looked at in detail and a solution found.

View full review »
Hammad Naeem - PeerSpot reviewer
Infrastructure Team Lead at Speridian Technologies

The solution should incorporate features similar to competitors like split tunneling. 

View full review »
RH
Senior Security Operations and Cyber Risk Analyst at a financial services firm with 51-200 employees

We had an instance where it wasn't processing the rules and we had to engage Microsoft to resolve that issue. Microsoft Support needs to improve its response time.

For larger enterprises, they need to adjust the scalability. This is the only issue that I'm have found that it attributed to the two weeks of downtime we had experienced.

They need to offer either a scaled-up or scaled-out version or versions for larger enterprise companies.

This would greatly improve the solution.

View full review »
JA
Freelance Consultant at The Future Group

Rules management could be better. You have all kinds of rules, and they can put something better in place there.

There should be better monitoring and logging. Currently, it is put in Sentinel. It should be more seamless and from the interface.

View full review »
DJ
Cloud Architect at a financial services firm with 1,001-5,000 employees

You have to have a defined IP range within your network to associate it with your network. The problem is you have to plan ahead of time if you expect to use the firewall in the future so that you don't have to reconfigure your subnets or that specific IP range. Other than that, I don't any issues. I use it for basic configuration for a single application, so I really don't try to leverage it for multiple applications where I might find some complexity or challenges.

View full review »
MA
Cyber Security architect at Avanade

In terms of features, it is great, but it has fewer features than you can get from other firewalls, like anti-spam and anti-phishing. Those kinds of things are not included. It only includes IDS and IDB.

View full review »
CF
Cloud Architect at a computer software company with 1,001-5,000 employees

The tool needs to improve the onboarding and transition process for on-prem users. 

View full review »
RK
Senior Security Analyst at a tech vendor with 1,001-5,000 employees

If I had to pick one area that needs improvement it would be the antivirus functionality, because it doesn't scan traffic for malware. It needs TLS inspection.

View full review »
DL
Network Engineer at a leisure / travel company with 10,001+ employees

In terms of what could be improved, it lacks a couple of features which are available in the other marketplace products, but it is stable and it performs most of the basic functions that are expected from a normal firewall.

When we deployed we did not have a centralized management of multiple firewalls. Right now, with Azure Firewall, we cannot have a normal inbound traffic flow. For inbound, Microsoft suggests using application gateways, so the options are very limited. I cannot use this firewall as an intermediate firewall because of the limitations, and I cannot point routing to another firewall. So if I want to use back-to-back firewall architecture in my environment, I cannot use Azure Firewall for that type of configuration either. 

Other features I would like to see are intrusion prevention, URL filtering, category-based URL filtering and other advanced features.

Overall, the configuration can definitely be improved.

In terms of the overall product architecture, if the management and the architecture of the product could support back-to-back firewall architectures so that I could use Azure Firewall in combination with another firewall, that would be one point which would help this product be used more and in a better way.

Again, if the Azure Firewall could be accommodated as a back-to-back firewall, meaning if it could work as a firewall which handles the inbound traffic from the internet, which is an NVA, or a network virtual appliance, and we could reroute the traffic to Azure Firewall, that would be good. But as of now, there is no routing options in Azure Firewall.

View full review »
SV
Cloud Architect at a pharma/biotech company with 10,001+ employees

The solution isn't missing features per se.

Azure should be able to work better as a balancer also, instead of just being a firewall. It should have a wider mandate.

There should be more use cases, specifically use cases for domains for, for example, healthcare and specific use cases for web applications.

View full review »
VT
IT Senior Architect, Infrastructure and Cloud Solutions at a government with 501-1,000 employees

In a future release, it could be empowered by combining with Azure Private DNS and Front Door.

View full review »
VJ
CEO at Foresight Cyber Ltd

Currently, it only supports IP addresses, so you have to be specific about the IPs that are in your environment. They could add specific instance names, such as an instance ID to be specified or a resource group.

Tagging is supported but not on the instances, which is something that could be improved.

The selection of the internal resources into the ruleset could be improved.

Support for layer-seven application filtering should be added because it is not there yet, at all.

It is capable of filtering on the fully qualified domain name (FQDN) but it cannot do the more advanced features that Palo Alto or FortiGate can do, where you can grant or limit access to Facebook but you don't need to specify the domain name because it knows about Facebook as an application. You should be able to simply say "Allow Facebook", but also have it block Facebook Chat, for example. Having control over those specific application protocols within the traffic would be an improvement.

The documentation from Microsoft could be slightly improved, although it could be related to the fact that the product is quickly changing. It may be a case that the documentation updates are of a lower priority than the product itself.

View full review »
MA
Senior System Engineer at Effvision

They can improve the pricing of Azure Firewall. 

View full review »
SP
Cloud Architect at a manufacturing company with 1,001-5,000 employees

The threat intelligence part could be better. I don't see why our customers have to get an additional solution with Azure Firewall. It would be great if they made it on par with Palo Alto.

View full review »
EA
Enterprise Solution Architect at a computer software company with 201-500 employees

There are a number of things that need to be simplified, but it's mostly costs. It needs to be simplified because it's pretty expensive.

View full review »
AL
Consultant at a manufacturing company with 1,001-5,000 employees

I think that their customer support could be improved with a faster response time. 

I think the product could be made more customizable, I'd like to see that in the next release.

View full review »
Buyer's Guide
Azure Firewall
May 2024
Learn what your peers think about Azure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,292 professionals have used our research since 2012.