Skip to content

Commit 4efa81a

Browse files
authored
Merge pull request #97170 from andrewmathuj/patch-1
Updating Blog Post with Tier Information
2 parents ad4130b + f26cd7a commit 4efa81a

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/web-application-firewall/afds/waf-front-door-tuning.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,10 @@ ms.custom: devx-track-azurepowershell
1515

1616
The Microsoft-managed Default Rule Set is based on the [OWASP Core Rule Set (CRS)](https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.1/dev) and includes Microsoft Threat Intelligence Collection rules. It is often expected that WAF rules need to be tuned to suit the specific needs of the application or organization using the WAF. This is commonly achieved by defining rule exclusions, creating custom rules, and even disabling rules that may be causing issues or false positives. There are a few things you can do if requests that should pass through your Web Application Firewall (WAF) are blocked.
1717

18+
> [!Note]
19+
>
20+
> Managed Rule Set is not available for Azure Front Door Standard SKU. For more information about the different tier SKUs, refer to [Feature comparison between tiers](/azure/frontdoor/standard-premium/tier-comparison#feature-comparison-between-tiers)
21+
1822
First, ensure you’ve read the [Front Door WAF overview](afds-overview.md) and the [WAF Policy for Front Door](waf-front-door-create-portal.md) documents. Also, make sure you’ve enabled [WAF monitoring and logging](waf-front-door-monitor.md). These articles explain how the WAF functions, how the WAF rule sets work, and how to access WAF logs.
1923

2024
## Understanding WAF logs

0 commit comments

Comments
 (0)