Skip to content

Commit 6b14c84

Browse files
committed
Fix typo: requestor -> requester
1 parent fcee1e5 commit 6b14c84

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following table shows examples of log scrubbing rules that can be used to pr
2929

3030
<sup>1</sup> If a request triggers a rule that scans the request body, and the content type is either `application/x-www-form-urlencoded` or `application/json`, the WAF will scrub all request details from the logs to prevent any potential storage of PII.
3131

32-
<sup>2</sup> Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
32+
<sup>2</sup> Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requester's IP address that appears in the WAF logs.
3333

3434
For more information, see [What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?](waf-sensitive-data-protection-frontdoor.md)
3535

0 commit comments

Comments
 (0)