Hi Bojan Zivkovic,
As you want to replace on-prem DCs with Azure-based DCs with controlling public URL access crucial for security you can either Squid Proxy in Azure or explore alternatives like Azure Firewall.
Here’s a breakdown
"Using Azure Firewall" could be a strong candidate for controlling access to public URLs. Azure Firewall allows you to create rules based on fully qualified domain names (FQDNs) and supports application-level filtering, which might be beneficial for your specific use case regarding Defender for Identity and other services. It can also simplify management by integrating with Azure Defender and Azure Monitor. It may cost more but gives you Scalability for future expansion.
If you already have a working configuration with "Squid Proxy on-prem", you might find it cost-effective to set up a Squid Proxy in Azure as well. However, as you mentioned, this approach might not offer any significant new features compared to what you already have. You would still need to maintain the infrastructure and ensure it’s secured and scalable.
You might also consider a "hybrid approach", where you use both Azure Firewall for managing access to critical services and Squid Proxy for other less sensitive traffic.
We can suggest you better if you could provide us with more information such as
What specific URLs or services do your DCs need access to?
Are there any performance considerations or constraints we should be aware of regarding the use of Squid Proxy in Azure vs. Azure Firewall?
Feel free to reach out if you have any further queries.
If you found the information useful, please click "Upvote" on the post to let us know.
Thank You.