Skip to content

Commit 4690d42

Browse files
authored
Merge pull request #273987 from vhorne/waf-bot1.1
Start Bot Manager 1.1 updates
2 parents 5ab2fdd + 3ac71f2 commit 4690d42

File tree

6 files changed

+63
-12
lines changed

6 files changed

+63
-12
lines changed

articles/web-application-firewall/afds/afds-overview.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What is Azure Web Application Firewall on Azure Front Door?
33
description: Learn how Azure Web Application Firewall on Azure Front Door protects your web applications from malicious attacks.
44
services: web-application-firewall
5-
author: vhorne
5+
author: sowmyam2019
66
ms.service: web-application-firewall
77
ms.topic: conceptual
88
ms.date: 10/04/2023
@@ -104,19 +104,21 @@ For more information, see [Web Application Firewall Default Rule Set rule groups
104104

105105
### Bot protection rule set
106106

107-
You can enable a managed bot protection rule set to take custom actions on requests from known bot categories.
107+
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
108108

109-
Three bot categories are supported:
109+
Three bot categories are supported: *Bad*, *Good*, and *Unknown*. Bot signatures are managed and dynamically updated by the WAF platform.
110110

111-
- **Bad**: Bad bots include bots from malicious IP addresses and bots that have falsified their identities. Malicious IP addresses are sourced from the Microsoft Threat Intelligence feed and updated every hour. [Intelligent Security Graph](https://www.microsoft.com/security/operations/intelligence) powers Microsoft Threat Intelligence and is used by multiple services, including Microsoft Defender for Cloud.
112-
- **Good**: Good bots include validated search engines.
113-
- **Unknown**: Unknown bots include other bot groups that have identified themselves as bots. Examples include market analyzers, feed fetchers, and data collection agents. Unknown bots are classified via published user agents without any other validation.
111+
- **Bad**: Bad bots are bots with malicious IP addresses and bots that have falsified their identities. Bad bots includes malicious IP addresses that are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise and IP reputation feeds. Bad bots also include bots that identify themselves as good bots but their IP addresses don’t belong to legitimate bot publishers.
112+
- **Good**: Good Bots are trusted user agents. Good bot rules are categorized into multiple categories to provide granular control over WAF policy configuration. These categories include verified search engine bots (such as Googlebot and Bingbot), validated link checker bots, verified social media bots (such as Facebookbot and LinkedInBot), verified advertising bots, verified content checker bots, and validated miscellaneous bots.
113+
- **Unknown**: Unknown bots are user agents without additional validation. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
114114

115115
The WAF platform manages and dynamically updates bot signatures. You can set custom actions to block, allow, log, or redirect for different types of bots.
116116

117117
![Screenshot that shows a bot protection rule set.](../media/afds-overview/botprotect2.png)
118118

119-
If bot protection is enabled, incoming requests that match bot rules are logged. You can access WAF logs from a storage account, an event hub, or Log Analytics. For more information about how the WAF logs requests, see [Azure Web Application Firewall monitoring and logging](waf-front-door-monitor.md).
119+
If bot protection is enabled, incoming requests that match bot rules are blocked, allowed, or logged based on the configured action. Bad bots are blocked, good bots are allowed, and unknown bots are logged by default. You can set custom actions to block, allow, log, or JS challenge for different types of bots. You can access WAF logs from a storage account, event hub, log analytics, or send logs to a partner solution.
120+
121+
The Bot Manager 1.1 rule set is available on Azure Front Door premium version.
120122

121123
## Configuration
122124

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 53 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Web Application Firewall DRS rule groups and rules
33
description: This article provides information on Azure Web Application Firewall DRS rule groups and rules.
44
ms.service: web-application-firewall
5-
author: vhorne
5+
author: sowmyam2019
66
ms.author: victorh
77
ms.topic: conceptual
88
ms.date: 05/30/2024
@@ -173,14 +173,26 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
173173
|[MS-ThreatIntel-WebShells](#drs9905-10)|MS-ThreatIntel-WebShells|Protect against Web shell attacks|
174174
|[MS-ThreatIntel-CVEs](#drs99001-10)|MS-ThreatIntel-CVEs|Protect against CVE attacks|
175175

176-
### Bot rules
176+
### Bot Manager 1.0
177+
178+
The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots.
177179

178180
|Rule group|Description|
179181
|---|---|
180182
|[BadBots](#bot100)|Protect against bad bots|
181183
|[GoodBots](#bot200)|Identify good bots|
182184
|[UnknownBots](#bot300)|Identify unknown bots|
183185

186+
### Bot Manager 1.1
187+
188+
The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection.
189+
190+
|Rule group|Description|
191+
|---|---|
192+
|[BadBots](#bot11-100)|Protect against bad bots|
193+
|[GoodBots](#bot11-200)|Identify good bots|
194+
|[UnknownBots](#bot11-300)|Identify unknown bots|
195+
184196
The following rule groups and rules are available when you use Azure Web Application Firewall on Azure Front Door.
185197

186198
# [DRS 2.1](#tab/drs21)
@@ -1050,9 +1062,9 @@ The following rule groups and rules are available when you use Azure Web Applica
10501062
|99001016|Attempted Spring Cloud Gateway Actuator injection [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)|
10511063
|99001017|Attempted Apache Struts file upload exploitation [CVE-2023-50164](https://www.cve.org/CVERecord?id=CVE-2023-50164)|
10521064

1053-
# [Bot rules](#tab/bot)
1065+
# [Bot Manager 1.0](#tab/bot)
10541066

1055-
## <a name="bot"></a> Bot manager rule sets
1067+
## <a name="bot"></a> 1.0 rule sets
10561068

10571069
### <a name="bot100"></a> Bad bots
10581070
|RuleId|Description|
@@ -1081,6 +1093,43 @@ The following rule groups and rules are available when you use Azure Web Applica
10811093

10821094
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
10831095

1096+
# [Bot Manager 1.1](#tab/bot11)
1097+
1098+
## <a name="bot11"></a> 1.1 rule sets
1099+
1100+
### <a name="bot11-100"></a> Bad bots
1101+
|RuleId|Description|
1102+
|---|---|
1103+
|Bot100100|Malicious bots detected by threat intelligence|
1104+
|Bot100200|Malicious bots that have falsified their identity|
1105+
|Bot100300|High risk bots detected by threat intelligence|
1106+
1107+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1108+
1109+
### <a name="bot11-200"></a> Good bots
1110+
|RuleId|Description|
1111+
|---|---|
1112+
|Bot200100|Search engine crawlers|
1113+
|Bot200200|Verified miscellaneous bots|
1114+
|Bot200300|Verified link checker bots|
1115+
|Bot200400|Verified social media bots|
1116+
|Bot200500|Verified content fetchers|
1117+
|Bot200600|Verified feed fetchers|
1118+
|Bot200700|Verified advertising bots|
1119+
1120+
### <a name="bot11-300"></a> Unknown bots
1121+
|RuleId|Description|
1122+
|---|---|
1123+
|Bot300100|Unspecified identity|
1124+
|Bot300200|Tools and frameworks for web crawling and attacks|
1125+
|Bot300300|General-purpose HTTP clients and SDKs|
1126+
|Bot300400|Service agents|
1127+
|Bot300500|Site health monitoring services|
1128+
|Bot300600|Unknown bots detected by threat intelligence. This rule also includes IP addresses matched to the Tor network.|
1129+
|Bot300700|Other bots|
1130+
1131+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1132+
10841133
---
10851134

10861135
## Next steps

articles/web-application-firewall/afds/waf-front-door-policy-configure-bot-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure bot protection for Web Application Firewall with Azure Front Door
33
description: Learn how to configure bot protection rule in Azure Web Application Firewall (WAF) for Front Door by using Azure portal.
4-
author: vhorne
4+
author: sowmyam2019
55
ms.service: web-application-firewall
66
ms.custom: devx-track-bicep
77
ms.topic: article
195 KB
Loading
-24.8 KB
Loading
150 KB
Loading

0 commit comments

Comments
 (0)