4. Always DNS: enable hybrid DNS
Active Directory domains need DNS to work, both in the cloud and on-prem.
- Cloud: Use Private DNS Zones in Azure to resolve internal names and private endpoints. Link them to your virtual networks so all VMs can access them.
- On-Prem: Configure conditional forwarders on your on-prem DNS servers that point to a DNS forwarder in Azure (for example, a VM or domain controller). That Azure forwarder can resolve names in the Private DNS Zones.
- Hybrid lookups: Use Azure DNS Private Resolver or custom DNS servers in Azure to enable name resolution between cloud and on-prem.
- Optional: Configure Azure Firewall as a DNS proxy to forward requests to your DNS forwarders and support FQDN rules.
Once done, point your Azure VNETs to these custom DNS servers to complete hybrid DNS resolution.
5. Keep an eye out: configure monitoring
As part of deploying your Landing Zone, you need to monitor your cloud resources and Azure service health. This shows if everything is running as it should.
6. Get out & in: routing
Just deploying your Azure Firewall (and almost any NVA firewalls) doesn’t make it effective; all firewall traffic is blocked until you add explicit allow rules. What you should do is route traffic to it and set rules for what to allow or block.
1. Outgoing traffic
- Any traffic leaving your spoke networks should go through the firewall for inspection.
- Every subnet in your spoke networks needs a route table with a route for 0.0.0.0/0 pointing to the firewall.
2. Firewall rules:
- All traffic to the Azure Firewall is blocked by default.
- Add Network or Application rules to allow the traffic you want to flow.
3. Inter-spoke routing:
Many organisations use a hub-spoke network topology. Make sure routes between spokes are correctly configured if traffic needs inspection or filtering via the hub firewall.
Internet egress:
If you want to allow outgoing internet traffic, you will need to configure explicit rules that allow it through.
7. Defend: Microsoft Defender for Cloud
When deploying your new landing zone, set policies to enable Microsoft Defender for Cloud for your Azure subscriptions which can protect your landing zone.
Defender for Cloud evaluates your resources against Microsoft’s security baseline and generates a security score, highlighting areas for improvement. You don’t need extra technical setup immediately, but review the recommendations and plan how to improve your security posture.
As you migrate resources into Azure, be ready to implement these improvements as part of your migration optimisation. Keep checking back for new recommendations, so your environment stays secure throughout the migration process.
Closing thoughts
Now that you have these seven key areas set up, your landing zone is prepared for migration.
Need help or advice to ensure your leap towards the cloud is smoothly and efficient? Intercept can help you!