Skip to content

Commit 2a10f4c

Browse files
committed
acro fixes
1 parent da40350 commit 2a10f4c

File tree

2 files changed

+17
-78
lines changed

2 files changed

+17
-78
lines changed

articles/web-application-firewall/afds/automated-detection-response-with-sentinel.md

Lines changed: 16 additions & 77 deletions
Original file line numberDiff line numberDiff line change
@@ -1,114 +1,53 @@
11
---
2-
title: Automated Detection and Response for Azure WAF with Microsoft Sentinel
3-
description: Use WAF detection templates in Sentinel, deploy a Playbook, and configure the detection and response in Sentinel.
2+
title: Automated detection and response for Azure WAF with Microsoft Sentinel
3+
description: Use WAF detection templates in Sentinel, deploy a playbook, and configure the detection and response in Sentinel.
44
author: vhorne
55
ms.author: victorh
66
ms.service: web-application-firewall
77
ms.topic: how-to
88
ms.date: 09/19/2023
99
---
1010

11-
<!-- 1. H1 -----------------------------------------------------------------------------
12-
13-
Required: Use a "<verb> * <noun>" format for your H1. Pick an H1 that clearly conveys the task the user will complete.
14-
15-
For example: "Migrate data from regular tables to ledger tables" or "Create a new Azure SQL Database".
16-
17-
* Include only a single H1 in the article.
18-
* Don't start with a gerund.
19-
* Don't include "Tutorial" in the H1.
20-
21-
-->
22-
23-
# Automated Detection and Response for Azure WAF with Microsoft Sentinel
24-
25-
<!-- 2. Introductory paragraph ----------------------------------------------------------
26-
27-
Required: Lead with a light intro that describes, in customer-friendly language, what the customer will do. Answer the fundamental “why would I want to do this?” question. Keep it short.
28-
29-
Readers should have a clear idea of what they will do in this article after reading the introduction.
30-
31-
* Introduction immediately follows the H1 text.
32-
* Introduction section should be between 1-3 paragraphs.
33-
* Don't use a bulleted list of article H2 sections.
34-
35-
Example: In this article, you will migrate your user databases from IBM Db2 to SQL Server by using SQL Server Migration Assistant (SSMA) for Db2.
36-
37-
-->
11+
# Automated detection and response for Azure WAF with Microsoft Sentinel
3812

3913
Malicious attackers increasingly target web applications by exploiting commonly known vulnerabilities such as SQL injection and Cross-site scripting. Preventing these attacks in application code poses a challenge, requiring rigorous maintenance, patching, and monitoring at multiple layers of the application topology. A Web Application Firewall (WAF) solution can react to a security threat faster by centrally patching a known vulnerability, instead of securing each individual web application. Azure Web Application Firewall (WAF) is a cloud-native service that protects web apps from common web-hacking techniques. You can deploy this service in a matter of minutes to gain complete visibility into the web application traffic and block malicious web attacks.
4014

4115
Integrating Azure WAF with Microsoft Sentinel (a cloud-native SIEM/SOAR solution) for automated detection and response to threats/incidents/alerts is an added advantage and reduces the manual intervention needed to update the WAF policy.
4216

43-
In this article, you learn about WAF detection templates in Sentinel, deploy a playbook, and configure the detection and response in Sentinel using these templates and the Playbook.
44-
45-
46-
47-
<!---Avoid notes, tips, and important boxes. Readers tend to skip over them. Better to put that info directly into the article text.
48-
49-
-->
50-
51-
<!-- 3. Prerequisites --------------------------------------------------------------------
52-
53-
Required: Make Prerequisites the first H2 after the H1.
54-
55-
* Provide a bulleted list of items that the user needs.
56-
* Omit any preliminary text to the list.
57-
* If there aren't any prerequisites, list "None" in plain text, not as a bulleted item.
58-
59-
-->
17+
In this article, you learn about WAF detection templates in Sentinel, deploy a playbook, and configure the detection and response in Sentinel using these templates and the playbook.
6018

6119
## Prerequisites
6220

6321
- If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
6422
- An Azure Front Door deployment with an associated WAF policy. For more information, see [Quickstart: Create a Front Door Standard/Premium using an ARM template](../../frontdoor/create-front-door-template.md), and [Tutorial: Create a WAF policy on Azure Front Door by using the Azure portal](waf-front-door-create-portal.md).
6523
- An Azure Front Door configured to capture logs in a Log Analytics workspace. For more information, see [Configure Azure Front Door logs](../../frontdoor/standard-premium/how-to-logs.md).
6624

67-
<!-- 4. Task H2s ------------------------------------------------------------------------------
68-
69-
Required: Multiple procedures should be organized in H2 level sections. A section contains a major grouping of steps that help users complete a task. Each section is represented as an H2 in the article.
70-
71-
For portal-based procedures, minimize bullets and numbering.
72-
73-
* Each H2 should be a major step in the task.
74-
* Phrase each H2 title as "<verb> * <noun>" to describe what they'll do in the step.
75-
* Don't start with a gerund.
76-
* Don't number the H2s.
77-
* Begin each H2 with a brief explanation for context.
78-
* Provide a ordered list of procedural steps.
79-
* Provide a code block, diagram, or screenshot if appropriate
80-
* An image, code block, or other graphical element comes after numbered step it illustrates.
81-
* If necessary, optional groups of steps can be added into a section.
82-
* If necessary, alternative groups of steps can be added into a section.
83-
84-
-->
85-
8625
## Deploy the playbook
8726
You install a Sentinel playbook named *Block-IPAzureWAF* from a template on GitHub. This playbook runs in response to WAF incidents. The goal is to create or modify a custom rule in a WAF policy to block requests from a certain IP address. This is accomplished using the Azure REST API.
8827

8928
You install the playbook from a template on GitHub.
90-
1. Go to the [Github repository](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20WAF/Playbook%20-%20WAF%20Sentinel%20Playbook%20Block%20IP%20-%20New) and select **Deploy to Azure** to launch the template.
91-
1. Fill in the required parameters. You can get your Frontdoor ID from the Azure portal. The Frontdoor ID is the resource ID of the Frontdoor resource.
29+
1. Go to the [GitHub repository](https://github.com/Azure/Azure-Network-Security/tree/master/Azure%20WAF/Playbook%20-%20WAF%20Sentinel%20Playbook%20Block%20IP%20-%20New) and select **Deploy to Azure** to launch the template.
30+
1. Fill in the required parameters. You can get your Front Door ID from the Azure portal. The Front Door ID is the resource ID of the Front Door resource.
9231
:::image type="content" source="../media/automated-detection-response-with-sentinel/playbook-template.png" alt-text="Screenshot showing the playbook template.":::
9332
1. Select **Review + create** and then **Create**.
9433

9534
## Authorize the API connection
9635

9736
An API connection named *azuresentinel-Block-IPAzureWAF* is created as part of this deployment. You must authorize it with your Azure ID to allow the playbook to make changes to your WAF policy.
9837

99-
:::image type="content" source="../media/automated-detection-response-with-sentinel/authorize-api.png" alt-text="Screenshot showing the API authorization screen."lightbox="../media/automated-detection-response-with-sentinel/authorize-api.png":::
100-
10138
1. In the Azure portal, select the *azuresentinel-Block-IPAzureWAF* API connection.
10239
1. Select **Edit API connection**.
10340
1. Under **Display Name**, type your Azure ID.
10441
1. Select **Authorize**.
10542
1. Select **Save**.
10643

44+
:::image type="content" source="../media/automated-detection-response-with-sentinel/authorize-api.png" alt-text="Screenshot showing the API authorization screen."lightbox="../media/automated-detection-response-with-sentinel/authorize-api.png":::
45+
10746
## Configure the Contributor role assignment
10847

10948
The playbook must have the necessary permissions to query and modify the existing WAF policy via the REST API. You can assign the playbook a system-assigned Managed Identity with Contributor permissions on the Front Door resource along with their associated WAF policies. You can assign permissions only if your account has been assigned Owner or User Access Administrator roles to the underlying resource.
11049

111-
This can be done using the IAM section in the respective resource by adding a new role assignment to this Playbook as shown below:
50+
This can be done using the IAM section in the respective resource by adding a new role assignment to this playbook.
11251

11352
1. In the Azure portal, select the Front Door resource.
11453
1. In the left pane, select **Access control (IAM)**.
@@ -117,7 +56,7 @@ This can be done using the IAM section in the respective resource by adding a ne
11756
1. Select **Privileged administrator roles**.
11857
1. Select **Contributor** and then select **Next**.
11958
1. Select **Select members**.
120-
1. Search for **Block-IPAzureWAF** and select it. There may be multiple entries for this playbook. The one you just recently added usually the last one in the list.
59+
1. Search for **Block-IPAzureWAF** and select it. There may be multiple entries for this playbook. The one you recently added usually the last one in the list.
12160
1. Select **Block-IPAzureWAF** and select **Select**.
12261
1. Select **Review + assign**.
12362

@@ -132,7 +71,7 @@ Repeat this procedure for the WAF policy resource.
13271

13372
## Configure detection and response
13473

135-
There are detection query templates for SQLi and XSS attacks in Sentinel for Azure WAF. You can download these templates from the Content hub. By using these templates, you can create analytic rules that detect specific type of attack patterns in the WAF logs and further notify the security analyst by creating an incident. The automation section of these rules can help you respond to this incident by blocking the source IP of the attacker on the WAF Policy which then stops subsequent attacks upfront from these source IP addresses. Microsoft is continuously working to include additional Detection Templates for more detection and response scenarios.
74+
There are detection query templates for SQLi and XSS attacks in Sentinel for Azure WAF. You can download these templates from the Content hub. By using these templates, you can create analytic rules that detect specific type of attack patterns in the WAF logs and further notify the security analyst by creating an incident. The automation section of these rules can help you respond to this incident by blocking the source IP of the attacker on the WAF policy, which then stops subsequent attacks upfront from these source IP addresses. Microsoft is continuously working to include more Detection Templates for more detection and response scenarios.
13675

13776
### Install the templates
13877

@@ -158,15 +97,15 @@ There are detection query templates for SQLi and XSS attacks in Sentinel for Azu
15897
1. Select **Next: Review + create**.
15998
1. Select **Save**.
16099

161-
Once the Analytic rule is created with respective Automation rule settings, you are now ready for *Detection and Response*. The following flow of events happens during an attack:
100+
Once the Analytic rule is created with respective Automation rule settings, you're now ready for *Detection and Response*. The following flow of events happens during an attack:
162101

163-
- When an attacker tries to target one of the web apps behind Azure WAF, the traffic is logged by the Azure WAF and the logs are ingested by Sentinel.
102+
- Azure WAF logs traffic when an attacker attempts to target one of the web apps behind it. Sentinel then ingests these logs.
164103
- The Analytic/Detection rule that you configured detects the pattern for this attack and generates an incident to notify an analyst.
165104
- The automation rule that is part of the analytic rule triggers the respective playbook that you configured previously.
166-
- The playbook creates a custom rule called *SentinelBlockIP* in the respective WAF policy which includes the source IP of the attacker.
167-
- The consequent attack attempts are blocked by WAF and if the attacker tries to use another source IP, the same flow happen again, and the respective source IP is also appended to this block rule.
105+
- The playbook creates a custom rule called *SentinelBlockIP* in the respective WAF policy, which includes the source IP of the attacker.
106+
- WAF blocks subsequent attack attempts, and if the attacker tries to use another source IP, it appends the respective source IP to the block rule.
168107

169-
An important point is that by default Azure WAF blocks any malicious web attacks with the help of core ruleset of the Azure WAF engine. However, this automated detection and response configuration further enhances the security by modifying or adding new custom block rules on the Azure WAF policy for the respective source IP addresses. This ensures that the traffic from these source IP addresses get blocked before it even hits the Azure WAF engine ruleset.
108+
An important point is that by default Azure WAF blocks any malicious web attacks with the help of core ruleset of the Azure WAF engine. However, this automated detection and response configuration further enhances the security by modifying or adding new custom block rules on the Azure WAF policy for the respective source IP addresses. This ensures that the traffic from these source IP addresses gets blocked before it even hits the Azure WAF engine ruleset.
170109

171110
## Related content
172111

articles/web-application-firewall/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@
168168
href: ./afds/protect-azure-open-ai.md
169169
- name: Using Microsoft Sentinel with Web Application Firewall
170170
href: waf-sentinel.md
171-
- name: Automated Detection and Response
171+
- name: Automated detection and response
172172
href: ./afds/automated-detection-response-with-sentinel.md
173173
- name: Troubleshoot
174174
items:

0 commit comments

Comments
 (0)