Skip to content

Commit 592a5df

Browse files
committed
Updates
1 parent a70fa35 commit 592a5df

File tree

2 files changed

+9
-5
lines changed

2 files changed

+9
-5
lines changed

articles/web-application-firewall/afds/waf-front-door-exclusion-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure a WAF exclusion list for an existing Front D
44
services: web-application-firewall
55
author: johndowns
66
ms.service: web-application-firewall
7-
ms.date: 09/13/2022
7+
ms.date: 10/18/2022
88
ms.author: jodowns
99
ms.topic: conceptual
1010
zone_pivot_groups: web-application-firewall-configuration

articles/web-application-firewall/afds/waf-front-door-exclusion.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,15 @@ You can specify an exact request header, body, cookie, or query string attribute
5151
- **Contains**: Match all request fields that contain the specified selector value.
5252
- **Equals any**: Match all request fields. When you use the *Equals any* operator, the selector value is automatically set to _*_. For example, you can use the *Equals any* operator to configure an exclusion that applies to all request headers.
5353

54+
### Case sensitivity
55+
5456
Header and cookie names are case insensitive. Query strings, POST arguments, and JSON arguments are case sensitive.
5557

56-
Some of the managed rules evaluate the raw payload of the request body, before it's parsed into POST arguments or JSON arguments. So, in some situations you might see log entries with a matchVariableName of `InitialBodyContents`. For example, suppose you create an exclusion with a match variable of *Request body POST args* and a selector to identify and ignore POST arguments named *FOO*. You'll no longer see any log entries with a matchVariableName of `PostParamValue:FOO`. However, if a POST argument named *FOO* contains text that triggers a rule, the log might show the detection in the initial body contents.
58+
### Body contents inspection
59+
60+
Some of the managed rules evaluate the raw payload of the request body, before it's parsed into POST arguments or JSON arguments. So, in some situations you might see log entries with a matchVariableName of `InitialBodyContents`.
61+
62+
For example, suppose you create an exclusion with a match variable of *Request body POST args* and a selector to identify and ignore POST arguments named *FOO*. You'll no longer see any log entries with a matchVariableName of `PostParamValue:FOO`. However, if a POST argument named *FOO* contains text that triggers a rule, the log might show the detection in the initial body contents.
5763

5864
## <a name="define-exclusion-based-on-web-application-firewall-logs"></a> Define exclusion rules based on Web Application Firewall logs
5965

@@ -96,9 +102,7 @@ If you determine that the request is legitimate, you could create an exclusion w
96102

97103
## Exclude other request attributes
98104

99-
If your WAF log entry shows a matchVariableName that isn't in the table above, you can't create an exclusion.
100-
101-
<!-- TODO example -->
105+
If your WAF log entry shows a matchVariableName that isn't in the table above, you can't create an exclusion. For example, you can't currently create exclusions for cookie names, header names, POST parameter names, or query parameter names.
102106

103107
Instead, consider taking one of the following actions:
104108

0 commit comments

Comments
 (0)