Skip to content

Commit 47b14fc

Browse files
committed
add tip
1 parent 2a10f4c commit 47b14fc

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/web-application-firewall/afds/automated-detection-response-with-sentinel.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,9 @@ There are detection query templates for SQLi and XSS attacks in Sentinel for Azu
8686
1. Select the **Front Door Premium WAF - SQLi Detection** template.
8787
1. On the right pane, select **Create rule**.
8888
1. Accept all the defaults and click through to **Automated response**. You can edit these settings later to customize the rule.
89+
> [!TIP]
90+
> If you see an error in the rule query, it might be because you don't have any WAF logs in your workspace. You can generate some logs by sending test traffic to your web app. For example, you can simulate a SQLi attack by sending a request like this: `http://x.x.x.x/?text1=%27OR%27%27=%27`. Replace `x.x.x.x` with your Front Door URL.
91+
8992
1. On the **Automated response** page, select **Add new**.
9093
1. On the **Create new automation rule** page, type a name for the rule.
9194
1. Under **Trigger**, select **When alert is created**.

0 commit comments

Comments
 (0)