Skip to content

Commit 787a9e0

Browse files
authored
Merge pull request #188036 from johndowns/waf-exclusion-list
Update WAF exclusion list article for clarity
2 parents d8c854e + 076bf68 commit 787a9e0

File tree

2 files changed

+14
-4
lines changed

2 files changed

+14
-4
lines changed

articles/web-application-firewall/afds/waf-front-door-exclusion.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,21 @@ description: This article provides information on exclusion lists configuration
44
services: web-application-firewall
55
author: vhorne
66
ms.service: web-application-firewall
7-
ms.date: 11/10/2020
7+
ms.date: 02/10/2022
88
ms.author: victorh
99
ms.topic: conceptual
1010
---
1111

1212
# Web Application Firewall (WAF) with Front Door Service exclusion lists
1313

14-
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. For example, Active Directory inserts tokens that are used for authentication. These tokens can contain special characters that may trigger a false positive from the WAF rules. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. An exclusion list can be configured using [PowerShell](/powershell/module/az.frontdoor/New-AzFrontDoorWafManagedRuleExclusionObject), [Azure CLI](/cli/azure/network/front-door/waf-policy/managed-rules/exclusion#az_network_front_door_waf_policy_managed_rules_exclusion_add), [Rest API](/rest/api/frontdoorservice/webapplicationfirewall/policies/createorupdate), or the Azure portal. The following example shows the Azure portal configuration.
14+
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. The rest of the request is evaluated as normal.
15+
16+
For example, Active Directory inserts tokens that are used for authentication. When used in a request header, these tokens can contain special characters that may trigger a false positive from the WAF rules. By adding the header to an exclusion list, you can configure WAF to ignore the header, but WAF still evaluates the rest of the request.
17+
18+
An exclusion list can be configured using [PowerShell](/powershell/module/az.frontdoor/New-AzFrontDoorWafManagedRuleExclusionObject), [Azure CLI](/cli/azure/network/front-door/waf-policy/managed-rules/exclusion#az_network_front_door_waf_policy_managed_rules_exclusion_add), [Rest API](/rest/api/frontdoorservice/webapplicationfirewall/policies/createorupdate), or the Azure portal. The following example shows the Azure portal configuration.
19+
1520
## Configure exclusion lists using the Azure portal
21+
1622
**Manage exclusions** is accessible from WAF portal under **Managed rules**
1723

1824
![Manage exclusion](../media/waf-front-door-exclusion/exclusion1.png)

articles/web-application-firewall/ag/application-gateway-waf-configuration.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides information on Web Application Firewall reque
44
services: web-application-firewall
55
author: vhorne
66
ms.service: web-application-firewall
7-
ms.date: 07/06/2021
7+
ms.date: 02/10/2022
88
ms.author: victorh
99
ms.topic: conceptual
1010
ms.custom: devx-track-azurepowershell
@@ -18,7 +18,11 @@ The Azure Application Gateway Web Application Firewall (WAF) provides protection
1818

1919
![Request size limits](../media/application-gateway-waf-configuration/waf-policy.png)
2020

21-
WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. A common example is Active Directory inserted tokens that are used for authentication or password fields. Such attributes are prone to contain special characters that may trigger a false positive from the WAF rules. Once an attribute is added to the WAF exclusion list, it isn't considered by any configured and active WAF rule. Exclusion lists are global in scope.
21+
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. The rest of the request is evaluated as normal.
22+
23+
For example, Active Directory inserts tokens that are used for authentication. When used in a request header, these tokens can contain special characters that may trigger a false positive from the WAF rules. By adding the header to an exclusion list, you can configure WAF to ignore the header, but WAF still evaluates the rest of the request.
24+
25+
Exclusion lists are global in scope.
2226

2327
The following attributes can be added to exclusion lists by name. The values of the chosen field aren't evaluated against WAF rules, but their names still are (see Example 1 below, the value of the User-Agent header is excluded from WAF evaluation). The exclusion lists remove inspection of the field's value.
2428

0 commit comments

Comments
 (0)