You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/afds/waf-front-door-exclusion.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,9 +51,15 @@ You can specify an exact request header, body, cookie, or query string attribute
51
51
-**Contains**: Match all request fields that contain the specified selector value.
52
52
-**Equals any**: Match all request fields. When you use the *Equals any* operator, the selector value is automatically set to _*_. For example, you can use the *Equals any* operator to configure an exclusion that applies to all request headers.
53
53
54
+
### Case sensitivity
55
+
54
56
Header and cookie names are case insensitive. Query strings, POST arguments, and JSON arguments are case sensitive.
55
57
56
-
Some of the managed rules evaluate the raw payload of the request body, before it's parsed into POST arguments or JSON arguments. So, in some situations you might see log entries with a matchVariableName of `InitialBodyContents`. For example, suppose you create an exclusion with a match variable of *Request body POST args* and a selector to identify and ignore POST arguments named *FOO*. You'll no longer see any log entries with a matchVariableName of `PostParamValue:FOO`. However, if a POST argument named *FOO* contains text that triggers a rule, the log might show the detection in the initial body contents.
58
+
### Body contents inspection
59
+
60
+
Some of the managed rules evaluate the raw payload of the request body, before it's parsed into POST arguments or JSON arguments. So, in some situations you might see log entries with a matchVariableName of `InitialBodyContents`.
61
+
62
+
For example, suppose you create an exclusion with a match variable of *Request body POST args* and a selector to identify and ignore POST arguments named *FOO*. You'll no longer see any log entries with a matchVariableName of `PostParamValue:FOO`. However, if a POST argument named *FOO* contains text that triggers a rule, the log might show the detection in the initial body contents.
57
63
58
64
## <aname="define-exclusion-based-on-web-application-firewall-logs"></a> Define exclusion rules based on Web Application Firewall logs
59
65
@@ -96,9 +102,7 @@ If you determine that the request is legitimate, you could create an exclusion w
96
102
97
103
## Exclude other request attributes
98
104
99
-
If your WAF log entry shows a matchVariableName that isn't in the table above, you can't create an exclusion.
100
-
101
-
<!-- TODO example -->
105
+
If your WAF log entry shows a matchVariableName that isn't in the table above, you can't create an exclusion. For example, you can't currently create exclusions for cookie names, header names, POST parameter names, or query parameter names.
102
106
103
107
Instead, consider taking one of the following actions:
0 commit comments