Skip to content

Commit 755e46b

Browse files
authored
Merge pull request #293077 from vhorne/waf-pol-ag
freshness review
2 parents 304659d + a793888 commit 755e46b

File tree

2 files changed

+13
-12
lines changed

2 files changed

+13
-12
lines changed

articles/web-application-firewall/ag/create-waf-policy-ag.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: web-application-firewall
55
ms.topic: conceptual
66
author: vhorne
77
ms.service: azure-web-application-firewall
8-
ms.date: 08/24/2023
8+
ms.date: 01/15/2025
99
ms.author: victorh
1010
---
1111

@@ -15,14 +15,14 @@ Associating a WAF policy with listeners allows for multiple sites behind a singl
1515

1616
You can make as many policies as you want. Once you create a policy, it must be associated to an Application Gateway to go into effect, but it can be associated with any combination of Application Gateways and listeners.
1717

18-
If your Application Gateway has an associated policy, and then you associate a different policy to a listener on that Application Gateway, the listener's policy takes effect, but just for the listener(s) that they're assigned to. The Application Gateway policy still applies to all other listeners that don't have a specific policy assigned to them.
18+
If your Application Gateway has an associated policy, and then you associate a different policy to a listener on that Application Gateway, the listener's policy takes effect, but just for the listeners that they're assigned to. The Application Gateway policy still applies to all other listeners that don't have a specific policy assigned to them.
1919

2020
> [!NOTE]
21-
> Once a Firewall Policy is associated to a WAF, there must always be a policy associated to that WAF. You may overwrite that policy, but disassociating a policy from the WAF entirely isn't supported.
21+
> Once a Firewall Policy is associated to a WAF, there must always be a policy associated to that WAF. You can overwrite that policy, but disassociating a policy from the WAF entirely isn't supported.
2222
23-
All new Web Application Firewall's WAF settings (custom rules, managed ruleset configurations, exclusions, etc.) live inside of a WAF Policy. If you have an existing WAF, these settings may still exist in your WAF config. For steps on how to move to the new WAF Policy, see [Upgrade your WAF Config to a WAF Policy](#upgrade) later in this article.
23+
All new Web Application Firewall's WAF settings (custom rules, managed ruleset configurations, exclusions, etc.) live inside of a WAF Policy. If you have an existing WAF, these settings might still exist in your WAF config. For steps on how to move to the new WAF Policy, see [Upgrade your WAF Config to a WAF Policy](#upgrade) later in this article.
2424

25-
WAF policies need to be in the enabled state to inspect request traffic, log events and take action on requests. WAF policies in detection mode will log events when WAF rules are triggered but won't take any other action. Policies in prevention mode will take action on requests as well as log the event in the logs.
25+
WAF policies need to be in the enabled state to inspect request traffic, log events and take action on requests. WAF policies in detection mode log events when WAF rules are triggered, but doesn't take any other action. Policies in prevention mode take action on requests and log the event in the logs.
2626

2727
## Create a policy
2828

@@ -37,6 +37,7 @@ First, create a basic WAF policy with a managed Default Rule Set (DRS) using the
3737
|Subscription |Select your subscription name|
3838
|Resource group |Select your resource group|
3939
|Policy name |Type a unique name for your WAF policy.|
40+
4041
3. On the **Association** tab, select **Add association**, then select one of the following settings:
4142

4243
|Setting |Value |
@@ -57,19 +58,19 @@ When you create a WAF policy, by default it is in *Detection* mode. In Detection
5758

5859
## Managed rules
5960

60-
Azure-managed OWASP rules are enabled by default. To disable an individual rule within a rule group, expand the rules within that rule group, select the check box in front of the rule number, and select **Disable** on the tab above.
61+
Azure-managed OWASP rules are enabled by default. To disable an individual rule within a rule group, expand the rules within that rule group, select the check box in front of the rule number, and select **Disable**.
6162

6263
[ ![Managed rules](../media/create-waf-policy-ag/managed-rules.png) ](../media/create-waf-policy-ag/managed-rules-lrg.png#lightbox)
6364

6465
## Custom rules
6566

66-
To create a custom rule, select **Add custom rule** under the **Custom rules** tab. This opens the custom rule configuration page. The following screenshot shows an example custom rule configured to block a request if the query string contains the text *blockme*.
67+
To create a custom rule, select **Add custom rule** under the **Custom rules** tab. This opens the custom rule configuration page. The following screenshot shows an example custom rule configured to block a request if the query string contains the text `blockme`.
6768

68-
[ ![Edit custom rule](../media/create-waf-policy-ag/edit-custom-rule.png) ](../media/create-waf-policy-ag/edit-custom-rule-lrg.png#lightbox)
69+
[![Edit custom rule](../media/create-waf-policy-ag/edit-custom-rule.png)](../media/create-waf-policy-ag/edit-custom-rule-lrg.png#lightbox)
6970

7071
## <a name="upgrade"></a>Upgrade your WAF Config to a WAF Policy
7172

72-
If you have an existing WAF, you may have noticed some changes in the portal. First you need to identify what kind of Policy you've enabled on your WAF. There are three potential states:
73+
If you have an existing WAF, you might notice some changes in the portal. First you need to identify what kind of Policy you've enabled on your WAF. There are three potential states:
7374

7475
1. No WAF Policy
7576
2. Custom Rules only Policy
@@ -85,15 +86,15 @@ If you select **Web Application Firewall** and it shows you an associated policy
8586

8687
If it also shows Policy Settings and Managed Rules, then it's a full Web Application Firewall policy.
8788

88-
![WAF policy settings](../media/create-waf-policy-ag/waf-policy-settings.png)
89+
![Screenshot showing WAF policy settings.](../media/create-waf-policy-ag/waf-policy-settings.png)
8990

9091
## Upgrade to WAF Policy
9192

92-
If you have a Custom Rules only WAF Policy, then you may want to move to the new WAF Policy. Going forward, the firewall policy supports WAF policy settings, managed rulesets, exclusions, and disabled rule-groups. Essentially, all the WAF configurations that were previously done inside the Application Gateway are now done through the WAF Policy.
93+
If you have a Custom Rules only WAF Policy, then you might want to move to the new WAF Policy. A policy supports WAF policy settings, managed rulesets, exclusions, and disabled rule-groups. Essentially, all the WAF configurations that were previously done inside the Application Gateway are now done through the WAF Policy.
9394

9495
Edits to the custom rule only WAF policy are disabled. To edit any WAF settings such as disabling rules, adding exclusions, etc. you have to upgrade to a new top-level firewall policy resource.
9596

96-
To do so, create a *Web Application Firewall Policy* and associate it to your Application Gateway(s) and listener(s) of choice. This new Policy must be exactly the same as the current WAF config, meaning every custom rule, exclusion, disabled rule, etc. must be copied into the new Policy you're creating. Once you have a Policy associated with your Application Gateway, then you can continue to make changes to your WAF rules and settings. You can also do this with Azure PowerShell. For more information, see [Associate a WAF policy with an existing Application Gateway](associate-waf-policy-existing-gateway.md).
97+
To do so, create a *Web Application Firewall Policy* and associate it to your Application Gateways and listeners of choice. This new Policy must be exactly the same as the current WAF config, meaning every custom rule, exclusion, disabled rule, etc. must be copied into the new Policy you're creating. Once you have a Policy associated with your Application Gateway, then you can continue to make changes to your WAF rules and settings. You can also do this with Azure PowerShell. For more information, see [Associate a WAF policy with an existing Application Gateway](associate-waf-policy-existing-gateway.md).
9798

9899
Optionally, you can use a migration script to upgrade to a WAF policy. For more information, see [Upgrade Web Application Firewall policies using Azure PowerShell](migrate-policy.md).
99100

68.6 KB
Loading

0 commit comments

Comments
 (0)