Skip to content

Commit 4059dfe

Browse files
authored
Merge pull request #215374 from halkazwini/waf-fd
WAF: Freshness: Tutorial: Create a Web Application Firewall policy on Azure Front Door using the Azure portal
2 parents a5a87e3 + e081f00 commit 4059dfe

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/web-application-firewall/afds/waf-front-door-create-portal.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: web-application-firewall
66
services: web-application-firewall
77
ms.topic: tutorial
8-
ms.date: 04/20/2022
8+
ms.date: 10/21/2022
99
ms.author: victorh
1010
---
1111

@@ -30,20 +30,20 @@ First, create a basic WAF policy with managed Default Rule Set (DRS) by using th
3030

3131
1. On the top left-hand side of the screen, select **Create a resource** > search for **WAF** > select **Web Application Firewall (WAF)** > select **Create**.
3232

33-
1. In the **Basics** tab of the **Create a WAF policy** page, enter or select the following information, accept the defaults for the remaining settings, and then select **Review + create**:
33+
1. In the **Basics** tab of the **Create a WAF policy** page, enter or select the following information, accept the defaults for the remaining settings:
3434

3535
| Setting | Value |
3636
| --- | --- |
3737
| Policy for | Select **Global WAF (Front Door)**. |
38-
| Front Door SKU | Select between basic, standard and premium SKU. |
39-
| Subscription | Select your Front Door subscription name.|
38+
| Front Door SKU | Select between **Classic**, **Standard** and **Premium** SKUs. |
39+
| Subscription | Select your Azure subscription.|
4040
| Resource group | Select your Front Door resource group name.|
4141
| Policy name | Enter a unique name for your WAF policy.|
4242
| Policy state | Set as **Enabled**. |
4343

4444
:::image type="content" source="../media/waf-front-door-create-portal/basic.png" alt-text="Screenshot of the Create a W A F policy page, with a Review + create button and list boxes for the subscription, resource group, and policy name.":::
4545

46-
1. In the **Association** tab of the **Create a WAF policy** page, select **+ Associate a Front Door profile**, enter the following settings, and then select **Add**:
46+
1. Select **Association**, and then select **+ Associate a Front door profile**, enter the following settings, and then select **Add**:
4747

4848
| Setting | Value |
4949
| --- | --- |
@@ -61,7 +61,7 @@ First, create a basic WAF policy with managed Default Rule Set (DRS) by using th
6161

6262
### Change mode
6363

64-
When you create a WAF policy, by the default WAF policy is in **Detection** mode. In **Detection** mode, WAF doesn't block any requests, instead, requests matching the WAF rules are logged at WAF logs.
64+
When you create a WAF policy, by default, WAF policy is in **Detection** mode. In **Detection** mode, WAF doesn't block any requests, instead, requests matching the WAF rules are logged at WAF logs.
6565
To see WAF in action, you can change the mode settings from **Detection** to **Prevention**. In **Prevention** mode, requests that match rules that are defined in Default Rule Set (DRS) are blocked and logged at WAF logs.
6666

6767
:::image type="content" source="../media/waf-front-door-create-portal/policy.png" alt-text="Screenshot of the Policy settings section. The Mode toggle is set to Prevention.":::
@@ -78,7 +78,7 @@ Below is an example of configuring a custom rule to block a request if the query
7878

7979
### Default Rule Set (DRS)
8080

81-
Azure-managed Default Rule Set is enabled by default. Current default version is DefaultRuleSet_1.0. From WAF **Managed rules**, **Assign**, recently available ruleset Microsoft_DefaultRuleSet_1.1 is available in the drop-down list.
81+
Azure-managed Default Rule Set (DRS) is enabled by default. Current default version is Microsoft_DefaultRuleSet_2.0. From **Managed rules** page, select **Assign** to assign a different DRS.
8282

8383
To disable an individual rule, select the **check box** in front of the rule number, and select **Disable** at the top of the page. To change actions types for individual rules within the rule set, select the check box in front of the rule number, and then select the **Change action** at the top of the page.
8484

@@ -92,4 +92,4 @@ When no longer needed, remove the resource group and all related resources.
9292

9393
> [!div class="nextstepaction"]
9494
> [Learn more about Azure Front Door](../../frontdoor/front-door-overview.md)
95-
> [Learn more about Azure Front Door Standard/Premium](../../frontdoor/standard-premium/overview.md)
95+
> [Learn more about Azure Front Door tiers](../../frontdoor/standard-premium/tier-comparison.md)
230 KB
Loading

0 commit comments

Comments
 (0)