Analyze Azure Network Security Group rules for security issues and best practices.
Output will appear here...Azure Network Security Groups (NSGs) filter traffic to and from Azure resources within a virtual network using priority-based rules that are evaluated in order from lowest to highest number. Unlike AWS security groups, NSGs support both allow and deny rules, and rule priority conflicts can produce unexpected behavior where a lower-priority allow is overridden by a higher-priority deny or vice versa. This linter analyzes your NSG rules for common security issues including unrestricted inbound access from the Internet service tag, overly broad port ranges, conflicting rules at different priorities, and missing deny-all rules at the end of your rule set.
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.