Skip to content

Commit 02934ce

Browse files
committed
modify exclusion article
1 parent df6bdb3 commit 02934ce

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/web-application-firewall/afds/waf-front-door-exclusion.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,17 @@ ms.topic: conceptual
1313

1414
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. For example, Active Directory inserts tokens that are used for authentication. These tokens can contain special characters that may trigger a false positive from the WAF rules. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. An exclusion list can be configured using [PowserShell](https://docs.microsoft.com/powershell/module/az.frontdoor/New-AzFrontDoorWafManagedRuleExclusionObject?view=azps-3.5.0), [Azure CLI](https://docs.microsoft.com/cli/azure/ext/front-door/network/front-door/waf-policy/managed-rules/exclusion?view=azure-cli-latest#ext-front-door-az-network-front-door-waf-policy-managed-rules-exclusion-add), [Rest API](https://docs.microsoft.com/rest/api/frontdoorservice/webapplicationfirewall/policies/createorupdate), or the Azure portal. The following example shows the Azure portal configuration.
1515
## Configure exclusion lists using the Azure portal
16-
**Manage exclusion** is accessible from WAF managed rules portal:
16+
**Manage exclusions** is accessible from WAF portal under **Managed rules**
17+
1718
![Manage exclusion](../media/waf-front-door-exclusion/exclusion1.png)
1819
![Manage exclusion_add](../media/waf-front-door-exclusion/exclusion2.png)
1920

2021
An example exclusion list:
2122
![Manage exclusion_define](../media/waf-front-door-exclusion/exclusion3.png)
2223

23-
This example excludes the value in the *user* header field. A valid request may include the *user* field that contains a string which triggers a SQL injection rule. You can exclude the *user* parameter in this case so that the WAF rule doesn't evaluate anything in the field.
24+
This example excludes the value in the *user* header field. A valid request may include the *user* field that contains a string that triggers a SQL injection rule. You can exclude the *user* parameter in this case so that the WAF rule doesn't evaluate anything in the field.
2425

25-
The following attributes can be added to exclusion lists by name. The values of the fields you use aren't evaluated against WAF rules, but their names are evaluated. The exclusion lists removes inspection of the field's value.
26+
The following attributes can be added to exclusion lists by name. The values of the fields you use aren't evaluated against WAF rules, but their names are evaluated. The exclusion lists remove inspection of the field's value.
2627

2728
* Request header name
2829
* Request cookie name

0 commit comments

Comments
 (0)