If you played even only minimally with NSG, you immediately realized that you need to think very carefully about your subnets and virtual network architecture: even if you can also assign NSG to the VM network interface (NIC) level, probably you will want to use subnets as your level of granularity ().
Since it is not easy and immediate to change subnet structure, if you already deployed VMs in there, my first suggestion is to design your VNET architecture before and (also) according to your NSG needs.
A typical data record has tripled if not quadrupled in size in just the last five years, however this data now has many forms including structured, semi-structured and non-structured.
In fact, according to a recent IBM® study, 2.5 quintillion bytes of data are written every day and 90% of global data has been created in the last two years alone.
In the diagram below, both VNETs and NSGs reside in a specific layer in the Azure overall security stack, where NSGs, UDR, and network virtual appliances can be used to create security boundaries to protect the application deployments in the protected network.
I will discuss two simple additional improvements to the DQN architecture, Double DQN and Dueling DQN, that allow for improved performance, stability, and faster training time.
In the end we will have a network that can tackle a number of challenging Atari games, and we will demonstrate how to train the DQN to learn a basic navigation task.
Once you have designed your network topology, you need to think about the architecture of the boundaries you want to enforce and probably how your DMZ will look like.
In this case, you need to answer at least the questions below, I fetched from an excellent article ( https://azure.microsoft.com/en-us/documentation/articles/best-practices-network-security Good!