Skip to content

Commit 58b0240

Browse files
committed
Drew tech review
1 parent 3ce3a78 commit 58b0240

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/application-gateway/waf-tshoot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides troubleshooting information for web applicati
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
7-
ms.date: 5/18/2019
7+
ms.date: 5/22/2019
88
ms.author: ant
99
ms.topic: conceptual
1010
---
@@ -19,9 +19,9 @@ First, ensure you’ve looked through the [WAF overview](waf-overview.md) and th
1919

2020
When you have WAF logs available, you can do a few things with them.
2121

22-
For example, say you have a legitimate traffic containing the string “1=1” that you want to pass through your WAF. If you try the request, the WAF blocks traffic that contains your “1=1” string in any parameter or field. You can look through the logs and see the timestamp of the request and the rules that blocked/matched.
22+
For example, say you have a legitimate traffic containing the string “1=1” that you want to pass through your WAF. If you try the request, the WAF blocks traffic that contains your “1=1” string in any parameter or field. This is a string often associated with a SQL injection attack. You can look through the logs and see the timestamp of the request and the rules that blocked/matched.
2323

24-
In the following example, you can see that four rules are triggered during the same request (using the TransactionId field). The first one says it matched because the user used a numeric/IP URL for the request, which increases the anomaly score. The next rule that matched is 942130, which is the one you’re looking for. You can see the **1=1** in the `details.data` field. This further increases the anomaly score. Generally, every rule that has the action **Matched** increases the anomaly score. For more information, see [Anomaly scoring mode](waf-overview.md#anomaly-scoring-mode).
24+
In the following example, you can see that four rules are triggered during the same request (using the TransactionId field). The first one says it matched because the user used a numeric/IP URL for the request, which increases the anomaly score by three since it's a warning. The next rule that matched is 942130, which is the one you’re looking for. You can see the **1=1** in the `details.data` field. This further increases the anomaly score by three again, as it's also a warning. Generally, every rule that has the action **Matched** increases the anomaly score, and at this point the anomaly score would be six. For more information, see [Anomaly scoring mode](waf-overview.md#anomaly-scoring-mode).
2525

2626
The final two log entries show the request was blocked because the anomaly score was high enough. These entries have a different action than the other two. They show they actually *blocked* the request. These rules are mandatory and can’t be disabled. They shouldn’t be thought of as rules, but more as core infrastructure of the WAF internals.
2727

0 commit comments

Comments
 (0)