Description:
- To reuse your security policy and scale without manual maintenance of explicit IP addresses.
- Allow to configure network security as a natural extension of an application’s architecture, allowing you to group virtual machines and define network security policies based on those groups.
- Join vms in a group that serves the same purpose, then they can act as a destination for nsg