Skip to content

Commit 75773ad

Browse files
Merge pull request #115823 from vhorne/waf-bot
add log entry
2 parents aad7c62 + df593f9 commit 75773ad

File tree

1 file changed

+28
-1
lines changed

1 file changed

+28
-1
lines changed

articles/web-application-firewall/ag/bot-protection-overview.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article provides an overview of web application firewall (WAF)
55
services: web-application-firewall
66
author: winthrop28
77
ms.service: web-application-firewall
8-
ms.date: 02/04/2020
8+
ms.date: 05/20/2020
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -29,6 +29,33 @@ You can use the Bot Protection ruleset alongside any of the OWASP rulesets (2.2.
2929

3030
The bot mitigation ruleset list of known bad IP addresses updates multiple times per day from the Microsoft Threat Intelligence feed to stay in sync with the bots. Your web applications are continuously protected even as the bot attack vectors change.
3131

32+
## Log example
33+
34+
Here's an example log entry for bot protection:
35+
36+
```
37+
{
38+
"timeStamp": "0000-00-00T00:00:00+00:00",
39+
"resourceId": "appgw",
40+
"operationName": "ApplicationGatewayFirewall",
41+
"category": "ApplicationGatewayFirewallLog",
42+
"properties": {
43+
"instanceId": "vm1",
44+
"clientIp": "1.2.3.4",
45+
"requestUri": "/hello.php?arg1=aaaaaaabccc",
46+
"ruleSetType": "MicrosoftBotProtection",
47+
"message": "IPReputationTriggered",
48+
"action": "Blocked",
49+
"hostname": "example.com",
50+
"transactionId": "abc",
51+
"policyId": "waf policy 1",
52+
"policyScope": "Global",
53+
"policyScopeName": "Default Policy",
54+
"engine": "Azwaf"
55+
}
56+
}
57+
```
58+
3259
## Next steps
3360

3461
- [Configure bot protection for Web Application Firewall on Azure Application Gateway (Preview)](bot-protection.md)

0 commit comments

Comments
 (0)