Skip to content

Commit 719e048

Browse files
Merge pull request #219694 from Miskatonic-Electronic/patch-28
Update application-gateway-waf-configuration.md
2 parents 309a87a + d94b6df commit 719e048

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/ag/application-gateway-waf-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ For example, suppose your requests include this header:
5454
My-Header: 1=1
5555
```
5656

57-
The value of the header (`1=1`) might be detected as an attack by the WAF. But if you know this is a legitimate value for your scenario, you can configure an exclusion for the *value* of the header. To do so, you use the **RequestHeaderValues** request attribute, and select the header name (`My-Header`) with the value that should be ignored.
57+
The value of the header (`1=1`) might be detected as an attack by the WAF. But if you know this is a legitimate value for your scenario, you can configure an exclusion for the *value* of the header. To do so, you use the **RequestHeaderValues** match variable, the operator **contains**, and the selector (`My-Header`).
5858

5959
> [!NOTE]
6060
> Request attributes by key and values are only available in CRS 3.2 or newer and Bot Manager 1.0 or newer.

0 commit comments

Comments
 (0)