Skip to content

Commit 0e5fa43

Browse files
committed
add a note for request body match variable
1 parent 7c87493 commit 0e5fa43

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: How to mask sensitive data on Azure Web Application Firewall on Azure Front Door
3-
description: Learn how to mask sensitive data on Azure Web Application Firewall on Azure Front Door.
3+
description: Learn how to mask sensitive data on Azure Web Application Firewall (WAF) for Azure Front Door using the log scrubbing feature.
44
author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-web-application-firewall
77
ms.topic: how-to
8-
ms.date: 06/24/2024
8+
ms.date: 04/29/2025
99
---
1010

1111
# How to mask sensitive data on Azure Web Application Firewall on Azure Front Door
@@ -17,17 +17,18 @@ The Web Application Firewall's (WAF) Log Scrubbing tool helps you remove sensiti
1717
1818
The following table shows examples of log scrubbing rules that can be used to protect your sensitive data:
1919

20-
| Match Variable | Operator | Selector | What gets scrubbed |
20+
| Match variable | Operator | Selector | What gets scrubbed |
2121
| --- | --- | --- | --- |
2222
| Request Header Names | Equals | keytoblock | {"matchVariableName":"HeaderValue:keytoblock","matchVariableValue":"****"} |
2323
| Request Cookie Names | Equals | cookietoblock | {"matchVariableName":"CookieValue:cookietoblock","matchVariableValue":"****"} |
24-
| Request Post Arg Names | Equals | var | {"matchVariableName":"PostParamValue:var","matchVariableValue":"****"} |
25-
| Request Body JSON Arg Names | Equals | JsonValue | {"matchVariableName":"JsonValue:key","matchVariableValue":"****"} |
24+
| Request Post Arg Names <sup>1</sup> | Equals | var | {"matchVariableName":"PostParamValue:var","matchVariableValue":"****"} |
25+
| Request Body JSON Arg Names <sup>1</sup> | Equals | JsonValue | {"matchVariableName":"JsonValue:key","matchVariableValue":"****"} |
2626
| Query String Arg Names | Equals | foo | {"matchVariableName":"QueryParamValue:foo","matchVariableValue":"****"} |
27-
| Request IP Address* | Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
27+
| Request IP Address <sup>2</sup> | Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
2828
| Request URI | Equals Any | NULL | {"matchVariableName":"URI","matchVariableValue":"****"} |
2929

30-
\* Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
30+
<sup>1</sup> The whole request body is scrubbed if this rule is triggered and the request content type is `application/x-www-form-urlencoded` or `application/json`.
31+
<sup>2</sup> Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
3132

3233
For more information, see [What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?](waf-sensitive-data-protection-frontdoor.md)
3334

@@ -56,7 +57,7 @@ Repeat to add more rules.
5657

5758
Use the following Azure PowerShell commands to create and configure Log Scrubbing rules for Sensitive Data Protection:
5859

59-
```azurepowershell
60+
```azurepowershell-interactive
6061
New-AzFrontDoorWafLogScrubbingRuleObject -MatchVariable <String> -SelectorMatchOperator <String>
6162
-State <String> [-Selector <String>] [-DefaultProfile <IAzureContextContainer>]
6263
[<CommonParameters>]
@@ -65,23 +66,22 @@ New-AzFrontDoorWafLogScrubbingSettingObject -ScrubbingRule <PSFrontDoorWafLogScr
6566
[-DefaultProfile <IAzureContextContainer>] [<CommonParameters>]
6667
```
6768

68-
#### [CLI](#tab/cli)
69+
#### [Azure CLI](#tab/cli)
6970

7071
Use the following Command Line Interface commands to [create and configure](/cli/azure/network/front-door/waf-policy) Log Scrubbing rules for Sensitive Data Protection:
7172

72-
```CLI
73+
```azurecli-interactive
7374
az network front-door waf-policy update -g <MyResourceGroup> -n <MyPolicyName> --log-scrubbing "{scrubbing-rules:[{match-variable:<MatchVariable>,selector-match-operator:<Operator>}],state:<Enabled/Disabled>}"
7475
```
7576

76-
7777
---
7878

7979
## Verify Sensitive Data Protection
8080

8181
To verify your Sensitive Data Protection rules, open the Front Door firewall log and search for _******_ in place of the sensitive fields.
8282

83-
## Next steps
83+
## Related content
8484

85+
- [What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?](waf-sensitive-data-protection-frontdoor.md)
8586
- [Azure Web Application Firewall monitoring and logging](../afds/waf-front-door-monitor.md)
8687
- [A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door](https://techcommunity.microsoft.com/t5/azure-network-security-blog/a-closer-look-at-azure-waf-s-data-masking-capabilities-for-azure/ba-p/4167558)
87-

0 commit comments

Comments
 (0)