Edit

Simulate security admin rule impact with rule impact analyzer

In this article, you learn how to use the rule impact analyzer feature to simulate your security admin rules on the traffic flows of your virtual networks in your Azure Virtual Network Manager instance’s security admin configuration’s rule collections blade. You can use the Azure portal to analyze what impact the security admin rules in your rule collection can have on your virtual networks before deploying them.

This feature helps you validate security admin rule behavior, identify potential impact to existing traffic flows, and ensure your connectivity requirements are met without disrupting live traffic. By understanding the impact of your security admin rules, you can confidently plan changes, maintain compliance, and reduce the risk of misconfiguration across your virtual networks.

Prerequisites

Simulate security admin rules in the Azure portal

Use rule impact analyzer in the Azure portal to analyze your security admin rules and simulate traffic flow patterns. In this step, you go to the rule impact analyzer feature.

  1. In the Azure portal, search for and select Network managers.

  2. Select your network manager instance.

  3. In the left menu, under Settings, select Configurations.

  4. Select your security admin configuration.

  5. In the left menu, under Settings, select Rule collections.

  6. Select Analyze rules for the rule collection you want.

Screenshot of the Azure Network Manager interface showing the Rule Impact Analyzer tool.

Important

Rule impact analysis works only on virtual networks with traffic analytics fully enabled. This requirement ensures the simulation is based on complete and accurate traffic data. The following virtual networks are automatically excluded because they can result in incomplete or inaccurate simulation results:

  • Virtual networks with subnet or NIC‑level flow logs.
  • Virtual networks with flow log filtering enabled.
  • AKS‑injected virtual networks.

Review results

After running the simulation, you see a detailed report that lists all existing traffic paths that have the target network groups’ virtual networks as the source or destination. The report shows how your security admin rules can affect those traffic paths.

Screenshot that shows the rule impact analyzer results with predicted traffic impact states (Affected, Not affected, Cannot be determined) for each traffic path.

The Predicted traffic impact column of the simulation results returns one of the following states:

  • Affected: a path where at least one simulated rule changes the existing traffic behavior.

  • Not affected: a path where none of the simulated rules change the existing traffic behavior.

  • Cannot be determined: a path where the analysis can't compute a result. For example, this state occurs if a Log Analytics workspace doesn't exist for traffic analytics, if access to the workspace is denied, or if required data is missing.

Select View details for any of the listed traffic paths. This selection opens a pane with additional information on each of the simulated security admin rules, showing whether a rule affects the selected traffic path.

Screenshot that shows the View details pane displaying whether a security admin rule is predicted to affect a traffic path between two virtual networks.

Configure scope

You can configure the scope of rule impact analyzer to choose your desired rule collections and specific security admin rules to simulate traffic flow patterns for your desired set of network groups and specific virtual networks.

Screenshot that shows the Configure scope options to select specific rule collections, rules, network groups, and virtual networks for analysis.

  1. In the rule impact analyzer results page, select Configure scope.

  2. Use each dropdown to select your desired rule collection, rules, network groups, and virtual networks.

  3. Select Apply to run rule impact analyzer on the new scope.

Next steps