Home

Reduce your exposure to brute force attacks from the virtual machine blade

Community Manager

Attackers commonly target open ports on Internet-facing virtual machines (VMs), spanning from port scanning to brute force and DDoS attacks. In case of a successful brute force attack, an attacker can compromise your VM and establish a foothold into your environment. Once an attacker is in your environment, he can profit from the compute of that machine or use its network access to perform lateral attacks on other networks.

 

One way to reduce exposure to an attack is to limit the amount of time that a port on your virtual machine is open. Ports only need to be open for a limited amount of time for you to perform management or maintenance tasks. Just-In-Time VM Access helps you control the time that the ports on your virtual machines are open. It leverages network security group (NSG) rules to enforce a secure configuration and access pattern.

 

Today we are excited to announce the public preview of configuring Just-In-Time VM Access from the virtual machine blade to make it even easier for you to reduce your exposure to threats.

 

6ecc86d1-b86f-4e93-9279-706b413927b8.png

 

Read more about it in the Azure blog.

Related Conversations
A problem with the Zoom level of a Tab
Tavory in Discussions on
9 Replies
Force to select a staff member at bookings
koppenburg in Microsoft Bookings on
0 Replies
Exposure level clarification
m_krone in Microsoft Defender ATP on
0 Replies