Harden App Service

Nerdio Manager consists of a number of PaaS services. The entry point into the Nerdio Manager application is the App Service. By default, the Nerdio Manager App Service is protected with Entra ID authentication, including MFA and conditional access, and is accessible from any internet location. It is possible to further protect the Nerdio Manager App Service by using access restrictions or enabling a private endpoint.

Note: Azure App Services also have FTP services enabled by default. These can be fully disabled for Nerdio Manager.

Requirements

To use VNet integration, in some instances, the App Service plan must be Standard, Premium, PremiumV2, or PremiumV3. Please note that some Basic plans support VNet integration. For details, see:

Configure access restrictions on the Nerdio Manager App Service

To configure access restrictions:

  1. In the Azure portal, go to App Services and select the Nerdio Manager App Service resource.

    Note: It typically has a name in the following format: nmw-app-xxxxxxxxx.

  2. In the left menu, navigate to the Settings > Networking.

    Note: By default, the configuration is to allow all access.

  3. In the Inbound Traffic section, select Access restriction.

  4. Select +Add.

  5. Type the Name and Description of the new rule.

  6. Ensure that Action is set to Allow.

  7. Specify the source IP address block to allow access.

    Note: This automatically adds a new Deny All rule to the list to prevent access from all other locations.

  8. Select Add rule.

  9. Once all rules have been applied, navigate to App Services > [your Nerdio Manager App Service name] > Settings > Networking > Public Network Access Restrictions.

  10. Under Site access and rules, on the Advanced tool site tab, select the Use main site rules option.

After a few minutes, only allowed IP ranges are able to connect to the Nerdio Manager application.

Create a private endpoint on the Nerdio Manager App Service

  1. In the Azure portal, select the Nerdio Manager App Service resource.

    Note: It typically has a name in the following format: nmw-app-xxxxxxxxx.

  2. In the left menu, navigate to Settings > Networking.

  3. In the Inbound Traffic section, select Add.

  4. Type a custom Name for the private endpoint.

  5. Choose the Subscription containing your VNet.

  6. Select the VNet and Subnet where the private endpoint should be attached.

  7. Optionally, depending on your VNet DNS configuration, you may be able to select the option for Integrate with private DNS zone.

    Notes:

    • Most customers specify custom DNS servers targeting their internal AD environment, in which case this option may be disabled.

    • If Integrate with private DNS zone is not enabled, make sure that the DNS is properly configured to resolve your private endpoint. See Azure Private Endpoint DNS Configuration for details.

  8. Select OK to save the private endpoint.

After a few minutes, any connections to Nerdio Manager's app service routing to the public IP addresses is rejected. Only connections that resolve your Nerdio Manager URL to the private endpoint IP address succeed.

Disable FTP services on the Nerdio Manager App Service

  1. In the Azure portal, select the Nerdio Manager App Service resource.

    Note: It typically has a name in the following format: nmw-app-xxxxxxxxx.

  2. In the left menu, navigate to Settings > Configuration.

  3. Navigate to the General settings tab.

  4. On the FTP state selector, change the option from All allowed (default) to Disabled.

  5. Select Save.

FTP services are now disabled for Nerdio Manager's App Service.

See also: