Skip to content

Commit 776c0a1

Browse files
Merge pull request #277941 from Miskatonic-Electronic/patch-33
Update waf-sensitive-data-protection-configure-frontdoor.md
2 parents 9c6854f + 086827a commit 776c0a1

File tree

1 file changed

+25
-5
lines changed

1 file changed

+25
-5
lines changed

articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,6 @@ ms.date: 04/09/2024
1010

1111
# How to mask sensitive data on Azure Web Application Firewall on Azure Front Door (preview)
1212

13-
> [!IMPORTANT]
14-
> Web Application Firewall on Azure Front Door Sensitive Data Protection is currently in PREVIEW.
15-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
16-
1713
The Web Application Firewall's (WAF) Log Scrubbing tool helps you remove sensitive data from your WAF logs. It works by using a rules engine that allows you to build custom rules to identify specific portions of a request that contain sensitive data. Once identified, the tool scrubs that information from your logs and replaces it with _*******_.
1814

1915
> [!NOTE]
@@ -39,7 +35,7 @@ For more information, see [What is Azure Web Application Firewall on Azure Front
3935

4036
Use the following information to enable and configure Sensitive Data Protection.
4137

42-
### Portal
38+
#### [Portal](#tab/browser)
4339

4440
To enable Sensitive Data Protection:
4541

@@ -56,6 +52,30 @@ To configure Log Scrubbing rules for Sensitive Data Protection:
5652

5753
Repeat to add more rules.
5854

55+
#### [PowerShell](#tab/powershell)
56+
57+
Use the following Azure PowerShell commands to create and configure Log Scrubbing rules for Sensitive Data Protection:
58+
59+
```azurepowershell
60+
New-AzFrontDoorWafLogScrubbingRuleObject -MatchVariable <String> -SelectorMatchOperator <String>
61+
-State <String> [-Selector <String>] [-DefaultProfile <IAzureContextContainer>]
62+
[<CommonParameters>]
63+
64+
New-AzFrontDoorWafLogScrubbingSettingObject -ScrubbingRule <PSFrontDoorWafLogScrubbingRule[]> -State <String>
65+
[-DefaultProfile <IAzureContextContainer>] [<CommonParameters>]
66+
```
67+
68+
#### [CLI](#tab/cli)
69+
70+
Use the following Command Line Interface commands to [create and configure](/cli/azure/network/front-door/waf-policy) Log Scrubbing rules for Sensitive Data Protection:
71+
72+
```CLI
73+
az network front-door waf-policy update -g <MyResourceGroup> -n <MyPolicyName> --log-scrubbing "{scrubbing-rules:[{match-variable:<MatchVariable>,selector-match-operator:<Operator>}],state:<Enabled/Disabled>}"
74+
```
75+
76+
77+
---
78+
5979
## Verify Sensitive Data Protection
6080

6181
To verify your Sensitive Data Protection rules, open the Front Door firewall log and search for _******_ in place of the sensitive fields.

0 commit comments

Comments
 (0)