Skip to content

Commit 1bb1dcc

Browse files
Update waf-sentinel.md
Adding the right image reference for Waf detections
1 parent e04161d commit 1bb1dcc

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/waf-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Using Sentinel ingested WAF logs, you can use Sentinel analytics rules to automa
8686

8787
Azure WAF also comes in with built-in Sentinel detection rules templates for SQLi, XSS, and Log4J attacks. These templates can be found under the Analytics tab in the 'Rule Templates' section of Sentinel. You can use these templates or define your own templates based on the WAF logs.
8888

89-
:::image type="content" source="media//waf-sentinel/waf-detections1.png" alt-text="WAF Detections" lightbox="media//waf-sentinel/waf-detections1.png":::
89+
:::image type="content" source="media//waf-sentinel/waf-detections-1.png" alt-text="WAF Detections" lightbox="media//waf-sentinel/waf-detections-1.png":::
9090

9191
The automation section of these rules can help you automatically respond to the incident by running a playbook. An example of such a playbook to respond to attack can be found in network security GitHub repository [here](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20WAF/Playbook%20-%20WAF%20Sentinel%20Playbook%20Block%20IP%20-%20New). This playbook automatically creates WAF policy custom rules to block the source IPs of the attacker as detected by the WAF analytics detection rules.
9292

0 commit comments

Comments
 (0)