Description:

  • To reuse your security policy and scale without manual maintenance of explicit IP addresses.
  • Allow to configure network security as a natural extension of an application’s architecture, allowing you to group virtual machines and define network security policies based on those groups.
  • Join vms in a group that serves the same purpose, then they can act as a destination for nsg

two