Easily manage Azure Network Security Group rules
or click to browse — supports .bicep, .json, .tf, and .csv files
Only literal/inline NSG definitions are supported. Dynamic expressions will be flagged.
| Priority | Name | Access | Protocol | Source | Src Port | Destination | Dst Port | Description | Actions |
|---|
| Priority | Name | Access | Protocol | Source | Src Port | Destination | Dst Port | Description | Actions |
|---|
No rules defined. Click + Add Rule or 📋 Templates to get started.
Your NSG ruleset is automatically assessed against industry security benchmarks. The score reflects common risks such as exposed management ports (RDP/SSH), overly broad address ranges, missing deny rules, and absent rule descriptions. Address any flagged items below to strengthen your security posture.
Test whether specific traffic would be allowed or denied by your NSG rules.
Click a template to add it. Priority will be auto-assigned.
Multiple NSG resources found. Select one to edit: