Skip to content

Commit 2e2d5a4

Browse files
committed
Updates before launch
1 parent 21f8d7c commit 2e2d5a4

File tree

3 files changed

+2
-7
lines changed

3 files changed

+2
-7
lines changed

articles/web-application-firewall/ag/application-gateway-waf-configuration.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -84,9 +84,8 @@ There can be any number of reasons to disable evaluating this header. There coul
8484

8585
You can use the following approaches to exclude the `User-Agent` header from evaluation by all of the SQL injection rules:
8686

87-
# [Azure portal](#tab/portal)
88-
89-
:::image type="content" source="../media/application-gateway-waf-configuration/waf-policy-exclusions-rule-edit.png" alt-text="Screenshot of the Azure portal that shows the per-rule exclusion configuration for the W A F policy.":::
87+
> [!NOTE]
88+
> As of early May 2022, we are rolling out updates to the Azure portal for these features. If you don't see configuration options in the portal, please use PowerShell, the Azure CLI, Bicep, or ARM templates to configure global or per-rule exclusions.
9089
9190
# [Azure PowerShell](#tab/powershell)
9291

@@ -214,10 +213,6 @@ Suppose you want to exclude the value in the *user* parameter that is passed in
214213

215214
The following example shows how you can exclude the `user` query string argument from evaluation:
216215

217-
# [Azure portal](#tab/portal)
218-
219-
:::image type="content" source="../media/application-gateway-waf-configuration/waf-policy-exclusions-global-edit.png" alt-text="Screenshot of the Azure portal that shows the global exclusion configuration for the W A F policy.":::
220-
221216
# [Azure PowerShell](#tab/powershell)
222217

223218
```azurepowershell

0 commit comments

Comments
 (0)