Skip to content

Commit 14330cc

Browse files
committed
Updates
1 parent 757d8d6 commit 14330cc

File tree

1 file changed

+44
-8
lines changed

1 file changed

+44
-8
lines changed

articles/web-application-firewall/afds/waf-front-door-monitor.md

Lines changed: 44 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The following shows an example log entry:
7272
{
7373
"time": "2020-06-09T22:32:17.8383427Z",
7474
"category": "FrontDoorAccessLog",
75-
"operationName": "Microsoft.Network/FrontDoor/AccessLog/Write",
75+
"operationName": "Microsoft.Cdn/Profiles/AccessLog/Write",
7676
"properties": {
7777
"trackingReference": "08Q3gXgAAAAAe0s71BET/QYwmqtpHO7uAU0pDRURHRTA1MDgANjMxNTAwZDAtOTRiNS00YzIwLTljY2YtNjFhNzMyOWQyYTgy",
7878
"httpMethod": "GET",
@@ -153,19 +153,29 @@ The following table shows the values logged for each request:
153153
| Property | Description |
154154
| ------------- | ------------- |
155155
| Action |Action taken on the request. Logs include requests with all actions. Metrics include requests with all actions except *Log*.|
156-
| ClientIp | The IP address of the client that made the request. If there was an `X-Forwarded-For` header in the request, the client IP address is taken from that header field instead. |
156+
| ClientIP | The IP address of the client that made the request. If there was an `X-Forwarded-For` header in the request, the client IP address is taken from that header field instead. |
157157
| ClientPort | The IP port of the client that made the request. |
158158
| Details | Additional details on the request, including any threats that were detected. <br />matchVariableName: HTTP parameter name of the request matched, for example, header names (up to 100 characters maximum).<br /> matchVariableValue: Values that triggered the match (up to 100 characters maximum). |
159159
| Host | The `Host` header of the request. |
160160
| Policy | The name of the WAF policy that processed the request. |
161161
| PolicyMode | Operations mode of the WAF policy. Possible values are `Prevention` and `Detection`. |
162162
| RequestUri | Full URI of the request. |
163163
| RuleName | The name of the WAF rule that the request matched. |
164-
| SocketIp | The source IP address seen by WAF. This IP address is based on the TCP session, and does not consider any request headers. |
164+
| SocketIP | The source IP address seen by WAF. This IP address is based on the TCP session, and does not consider any request headers. |
165165
| TrackingReference | The unique reference string that identifies a request served by Front Door. This value is sent to the client in the `X-Azure-Ref` response header. Use this field when searching for a specific request in the log. |
166166

167167
The following example query shows the requests that were blocked by the Front Door WAF:
168168

169+
::: zone pivot="front-door-standard-premium"
170+
171+
```kusto
172+
AzureDiagnostics
173+
| where ResourceProvider == "MICROSOFT.CDN" and Category == "FrontDoorWebApplicationFirewallLog"
174+
| where action_s == "Block"
175+
```
176+
177+
::: zone-end
178+
169179
::: zone pivot="front-door-classic"
170180

171181
```kusto
@@ -176,17 +186,41 @@ AzureDiagnostics
176186

177187
::: zone-end
178188

189+
The following shows an example log entry, including the reason that the request was blocked:
190+
179191
::: zone pivot="front-door-standard-premium"
180192

181-
```kusto
182-
AzureDiagnostics
183-
| where ResourceProvider == "MICROSOFT.CDN" and Category == "FrontDoorWebApplicationFirewallLog"
184-
| where action_s == "Block"
193+
```json
194+
{
195+
"time": "2020-06-09T22:32:17.8376810Z",
196+
"category": "FrontdoorWebApplicationFirewallLog",
197+
"operationName": "Microsoft.Cdn/Profiles/Write",
198+
"properties": {
199+
"clientIP": "xxx.xxx.xxx.xxx",
200+
"clientPort": "52097",
201+
"socketIP": "xxx.xxx.xxx.xxx",
202+
"requestUri": "https://wafdemofrontdoorwebapp.azurefd.net:443/?q=%27%20or%201=1",
203+
"ruleName": "Microsoft_DefaultRuleSet-1.1-SQLI-942100",
204+
"policy": "WafDemoCustomPolicy",
205+
"action": "Block",
206+
"host": "wafdemofrontdoorwebapp.azurefd.net",
207+
"trackingReference": "08Q3gXgAAAAAe0s71BET/QYwmqtpHO7uAU0pDRURHRTA1MDgANjMxNTAwZDAtOTRiNS00YzIwLTljY2YtNjFhNzMyOWQyYTgy",
208+
"policyMode": "prevention",
209+
"details": {
210+
"matches": [
211+
{
212+
"matchVariableName": "QueryParamValue:q",
213+
"matchVariableValue": "' or 1=1"
214+
}
215+
]
216+
}
217+
}
218+
}
185219
```
186220

187221
::: zone-end
188222

189-
The following shows an example log entry, including the reason that the request was blocked:
223+
::: zone pivot="front-door-classic"
190224

191225
```json
192226
{
@@ -216,6 +250,8 @@ The following shows an example log entry, including the reason that the request
216250
}
217251
```
218252

253+
::: zone-end
254+
219255
## Next steps
220256

221257
- Learn more about [Front Door](../../frontdoor/front-door-overview.md).

0 commit comments

Comments
 (0)