In the previous article, we played a bit more advanced with PowerShell to pull over 1,000 malicious hosts from MDL (Malware Domain List) and then created Azure Firewall application rules accordingly. To get the list being up-to-date state, you may run the list in a periodical schedule or have a virtual machine with scheduler (e.g. Task Scheduler) to run your script. Another approach to be considered is Azure Automation to automate firewall rule creation and update.
In this article, we will look into deploying the PowerShell script in an automation runbook and schedule it to continuously maintain firewall application rule.