Severity: High
Description: This control ensures that network security group does not allows to UDP port 445 for CIFS from any (*) source address. The potential security problem with using open port over the Internet is that attackers can use various brute force techniques to gain access to Azure Virtual Machines. Once the attackers gain access, they can use your virtual machine as a launch point for compromising other machines on your Azure Virtual Network or even attack networked devices outside of Azure.
Remediation Steps:
Perform following to update App Service configuration:
Login to Azure Portal using https://portal.azure.com.
Go to Application security groups.
Click on the application security group that reported to delete the rule.
In the network security group's menu bar, choose Inbound security rules.
In the left menu, under the Security section, click Advanced security.
Select the rule which allows access from any (*) source address.
Select Delete, and then select Yes.
Important:
Remediating may result in user losing some connection whose IP is not whitelisted in rules
Reference: