Skip to content

Commit 4f2552e

Browse files
committed
correction
1 parent 81ea6c9 commit 4f2552e

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ The following table shows examples of log scrubbing rules that can be used to pr
2828
| Request URI | Equals Any | NULL | {"matchVariableName":"URI","matchVariableValue":"****"} |
2929

3030
<sup>1</sup> The whole request body is scrubbed if this rule is triggered and the request content type is `application/x-www-form-urlencoded` or `application/json`.
31+
3132
<sup>2</sup> Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
3233

3334
For more information, see [What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?](waf-sensitive-data-protection-frontdoor.md)

0 commit comments

Comments
 (0)