You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-web-application-firewall.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: martinco
7
7
ms.reviewer: kengaderdus
8
8
ms.service: azure-active-directory
9
9
ms.topic: how-to
10
-
ms.date: 01/26/2024
10
+
ms.date: 10/29/2024
11
11
ms.author: gasinh
12
12
ms.subservice: b2c
13
13
@@ -81,7 +81,7 @@ Learn more: [Azure Web Application Firewall DRS rule groups and rules](../web-ap
81
81
82
82
### Bot Manager Ruleset
83
83
84
-
By default, the Azure Front Door WAF deploys with the latest version of our Bot Manager ruleset. This ruleset categories bot traffic into good, bad, and unknown bots. The bot signatures behind this ruleset are managed by the WAF platform and are updated dynamically.
84
+
By default, the Azure Front Door WAF deploys with the latest version of our Bot Manager ruleset. This ruleset categorizes bot traffic into good, bad, and unknown bots. The bot signatures behind this ruleset are managed by the WAF platform and are updated dynamically.
85
85
86
86
Learn more: [What is Azure Web Application Firewall on Azure Front Door?](../web-application-firewall/afds/afds-overview.md#bot-protection-rule-set)
87
87
@@ -95,7 +95,7 @@ Learn more:
95
95
96
96
### Detection and Prevention modes
97
97
98
-
When you create WAF policy, the policy starts in Detection mode. We recommend you leave the WAF Detection mode while you tune the WAF for your traffic. In this mode, WAF doesn't block requests. Instead, requests that match the WAF rules are logged by the WAF once logging is enabled.
98
+
When you create a WAF policy, the policy starts in "Detection mode." We recommend you leave the WAF policy in Detection mode while you tune the WAF for your traffic. In this mode, WAF doesn't block requests. Instead, requests that match the WAF rules are logged by the WAF once logging is enabled.
99
99
100
100
Enable logging: [Azure Web Application Firewall monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md#logs-and-diagnostics)

117
-
118
-

116
+
|RuleID|DetailMsg|Action|Mode|DetailData|
117
+
|---|---|---|---|---|
118
+
|DefaultRuleSet-1.0-SQLI-942430|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Block|detection|Matched Data: CfDJ8KQ8bY6D|
119
119
120
120
Review the WAF logs to determine if policy rules cause false positives. Then, exclude the WAF rules based on the WAF logs.
121
121
122
122
Learn more
123
123
-[Configure WAF exclusion lists for Azure Front Door](../web-application-firewall/afds/waf-front-door-exclusion-configure.md)
124
124
-[Web application firewall exclusion lists in Azure Front Door](../web-application-firewall/afds/waf-front-door-exclusion.md)
125
125
126
-
Once you have logging set up and your WAF is receiving traffic, you can check the efficacy of your bot manager rules at dealing with bot traffic. The following query shows actions taken by your bot manager rulesetby category of bot. While in detection mode, the WAF only takes log actions on bot traffic but, once you switch to prevention mode, the WAF starts taking additional actions to block unwanted bot traffic.
126
+
Once logging is set up and your WAF is receiving traffic, you can assess the effectiveness of your bot manager rules in handling bot traffic. The following query shows the actions taken by your bot manager ruleset, categorized by bot type. While in detection mode, the WAF logs bot traffic actions only. However, once switched to prevention mode, the WAF begins actively blocking unwanted bot traffic.
127
127
128
128
```json
129
129
AzureDiagnostics
@@ -140,12 +140,12 @@ AzureDiagnostics
140
140
141
141
To see WAF take action on request traffic, select **Switch to prevention mode** from the Overview page, which changes the mode from Detection to Prevention. Requests that match the rules in the DRS are blocked and logged in the WAF logs. The WAF takes the prescribed action when a request matches one, or more, rules in the DRS and log the results. By default, the DRS is set to anomaly scoring mode; this means that the WAF doesn't take any action on a request unless the anomaly score threshold is met.
142
142
143
-
Learn more: Anomaly scoring ([Azure Web Application Firewall DRS rule groups and rules](../web-application-firewall/afds/waf-front-door-drs.md#anomaly-scoring-mode))
143
+
Learn more: Anomaly scoring [Azure Web Application Firewall DRS rule groups and rules](../web-application-firewall/afds/waf-front-door-drs.md#anomaly-scoring-mode)
144
144
145
145
To revert to Detection mode, select **Switch to detection mode** from the Overview page.
146
146
147
147
## Next steps
148
148
149
-
*[Azure Web Application Firewall monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md)
150
-
*[Web application firewall exclusion lists in Azure Front Door](../web-application-firewall/afds/waf-front-door-exclusion.md)
149
+
*[Azure Web Application Firewall monitoring and logging](../web-application-firewall/ag/create-waf-policy-ag.md)
150
+
*[Web application firewall exclusion lists in Azure Front Door](../web-application-firewall/afds/waf-front-door-tuning.md)
151
151
*[Best practices for Azure Web Application Firewall in Azure Front Door](../web-application-firewall/afds/waf-front-door-best-practices.md)
0 commit comments