Skip to content

Commit 3bc3da1

Browse files
authored
Merge pull request #103123 from vhorne/waf-bot-protection
Start WAF bot protection overview
2 parents 8edee71 + d732ba3 commit 3bc3da1

File tree

3 files changed

+36
-0
lines changed

3 files changed

+36
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
title: WAF on Azure Application Gateway bot protection overview
3+
titleSuffix: Azure Web Application Firewall
4+
description: This article provides an overview of web application firewall (WAF) on Application Gateway bot protection
5+
services: web-application-firewall
6+
author: winthrop28
7+
ms.service: web-application-firewall
8+
ms.date: 02/04/2020
9+
ms.author: victorh
10+
ms.topic: conceptual
11+
---
12+
13+
# Azure Web Application Firewall on Azure Application Gateway bot protection overview
14+
15+
Roughly 20% of all Internet traffic comes from bad bots. They do things like scraping, scanning, and looking for vulnerabilities in your web application. When these bots are stopped at the Web Application Firewall (WAF), they can’t attack you. They also can’t use up your resources and services, such as your backends and other underlying infrastructure.
16+
17+
You can enable a managed bot protection rule set for your WAF to block or log requests from known malicious IP addresses. The IP addresses are sourced from the Microsoft Threat Intelligence feed. Intelligent Security Graph powers Microsoft threat intelligence and is used by multiple services including Azure Security Center.
18+
19+
> [!IMPORTANT]
20+
> The bot protection rule set is currently in public preview and is provided with a preview service level agreement. Certain features may not be supported or may have constrained capabilities. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for details.
21+
22+
## Use with OWASP rulesets
23+
24+
You can use the Bot Protection ruleset alongside any of the OWASP rulesets (2.2.9, 3.0, and 3.1). Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains an additional rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_0.1**, and you can enable or disable it like the other OWASP rules.
25+
26+
![Bot ruleset](../media/bot-protection-overview/bot-ruleset.png)
27+
28+
## Ruleset update
29+
30+
The bot mitigation ruleset list of known bad IP addresses updates multiple times per day from the Microsoft Threat Intelligence feed to stay in sync with the bots. Your web applications are continuously protected even as the bot attack vectors change.
31+
32+
## Next steps
33+
34+
- [Configure bot protection for Web Application Firewall on Azure Application Gateway (Preview)](bot-protection.md)
83.7 KB
Loading

articles/web-application-firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@
4444
href: ./ag/application-gateway-waf-configuration.md
4545
- name: WAF Policy overview
4646
href: ./ag/policy-overview.md
47+
- name: Bot protection overview
48+
href: ./ag/bot-protection-overview.md
4749
- name: Front Door
4850
items:
4951
- name: Custom rules

0 commit comments

Comments
 (0)