Skip to content

Commit 10248bb

Browse files
authored
Merge pull request #102948 from teresayao/Magnese
Magnese
2 parents 32e1cf4 + f004247 commit 10248bb

File tree

3 files changed

+57
-10
lines changed

3 files changed

+57
-10
lines changed

articles/web-application-firewall/afds/waf-front-door-monitor.md

Lines changed: 52 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,16 +38,66 @@ AzureDiagnostics
3838
3939
```
4040

41+
Here is an example of a logged request in WAF log:
42+
43+
``` WAFlogQuerySample
44+
{
45+
"PreciseTimeStamp": "2020-01-25T00:11:19.3866091Z",
46+
"time": "2020-01-25T00:11:19.3866091Z",
47+
"category": "FrontdoorWebApplicationFirewallLog",
48+
"operationName": "Microsoft.Network/FrontDoor/WebApplicationFirewallLog/Write",
49+
"properties": {
50+
"clientIP": "xx.xx.xxx.xxx",
51+
"socketIP": "xx.xx.xxx.xxx",
52+
"requestUri": "https://wafdemofrontdoorwebapp.azurefd.net:443/?q=../../x",
53+
"ruleName": "Microsoft_DefaultRuleSet-1.1-LFI-930100",
54+
"policy": "WafDemoCustomPolicy",
55+
"action": "Block",
56+
"host": "wafdemofrontdoorwebapp.azurefd.net",
57+
"refString": "0p4crXgAAAABgMq5aIpu0T6AUfCYOroltV1NURURHRTA2MTMANjMxNTAwZDAtOTRiNS00YzIwLTljY2YtNjFhNzMyOWQyYTgy",
58+
"policyMode": "prevention"
59+
}
60+
}
61+
62+
```
63+
4164
The following example query obtains AccessLogs entries:
4265

4366
``` AccessLogQuery
4467
AzureDiagnostics
4568
| where ResourceType == "FRONTDOORS" and Category == "FrontdoorAccessLog"
4669
70+
```
71+
72+
Here is an example of a logged request in Access log:
73+
74+
``` AccessLogSample
75+
{
76+
"PreciseTimeStamp": "2020-01-25T00:11:12.0160150Z",
77+
"time": "2020-01-25T00:11:12.0160150Z",
78+
"category": "FrontdoorAccessLog",
79+
"operationName": "Microsoft.Network/FrontDoor/AccessLog/Write",
80+
"properties": {
81+
"trackingReference": "0n4crXgAAAACnRKbdALbyToAqNfSHssDvV1NURURHRTA2MTMANjMxNTAwZDAtOTRiNS00YzIwLTljY2YtNjFhNzMyOWQyYTgy",
82+
"httpMethod": "GET",
83+
"httpVersion": "2.0",
84+
"requestUri": "https://wafdemofrontdoorwebapp.azurefd.net:443/",
85+
"requestBytes": "710",
86+
"responseBytes": "3116",
87+
"userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4017.0 Safari/537.36 Edg/81.0.389.2",
88+
"clientIp": "xx.xx.xxx.xxx",
89+
"timeTaken": "0.598",
90+
"securityProtocol": "TLS 1.2",
91+
"routingRuleName": "WAFdemoWebAppRouting",
92+
"backendHostname": "wafdemouksouth.azurewebsites.net:443",
93+
"sentToOriginShield": false,
94+
"httpStatusCode": "200",
95+
"httpStatusDetails": "200"
96+
}
97+
}
4798
4899
```
49100

50101
## Next steps
51102

52-
- Learn more about [Front Door](../../frontdoor/front-door-overview.md).
53-
103+
- Learn more about [Front Door](../../frontdoor/front-door-overview.md).

articles/web-application-firewall/afds/waf-front-door-policy-configure-bot-protection.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure bot protection for WAF with Azure Front Door (Preview)
2+
title: Configure bot protection for Web Application Firewall with Azure Front Door (Preview)
33
description: Learn Web Application Firewall (WAF).
44
author: vhorne
55
ms.service: web-application-firewall
@@ -10,9 +10,7 @@ ms.author: victorh
1010
---
1111

1212
# Configure bot protection for Web Application Firewall (Preview)
13-
This article shows you how to configure bot protection rule in Azure Web Application Firewall (WAF) for Front Door by using Azure CLI, Azure PowerShell, or Azure Resource Manager template.
14-
15-
A managed Bot protection rule set can be enabled for your WAF to take custom actions on requests from known malicious IP addresses. The IP addresses are sourced from the Microsoft Threat Intelligence feed. [Intelligent Security Graph](https://www.microsoft.com/security/operations/intelligence) powers Microsoft threat intelligence and is used by multiple services including Azure Security Center.
13+
This article shows you how to configure bot protection rule in Azure Web Application Firewall (WAF) for Front Door by using Azure portal. Bot protection rule can also be configured using CLI, Azure PowerShell, or Azure Resource Manager template.
1614

1715
> [!IMPORTANT]
1816
> Bot protection rule set is currently in public preview and is provided with a preview service level agreement. Certain features may not be supported or may have constrained capabilities. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for details.
@@ -23,10 +21,9 @@ Create a basic WAF policy for Front Door by following the instructions described
2321

2422
## Enable bot protection rule set
2523

26-
1. In the basic policy page that you created in the preceding section, under **Settings**, click **Rules**.
27-
2. In the details page, under the **Manage rules** section, from the drop-down menu, select the check box in front of the rule **BotProtection-preview-0.1**, and then select **Save** above.
28-
29-
![Bot protection rule](.././media/waf-front-door-configure-bot-protection/botprotect2.png)
24+
In the **Managed Rules** page when creating a Web Application Firewall policy, first find **Managed rule set** section, select the check box in front of the rule **Microsoft_BotManager_1.0** from the drop-down menu, and then select **Review + Create**.
25+
26+
![Bot protection rule](.././media/waf-front-door-configure-bot-protection/botmanager112019.png)
3027

3128
## Next steps
3229

94.5 KB
Loading

0 commit comments

Comments
 (0)