Skip to content

Commit 8615b61

Browse files
committed
edits per Gargi
1 parent 5618a55 commit 8615b61

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory-b2c/partner-web-application-firewall.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 10/29/2024
1111
ms.author: gasinh
1212
ms.subservice: b2c
1313

@@ -81,7 +81,7 @@ Learn more: [Azure Web Application Firewall DRS rule groups and rules](../web-ap
8181

8282
### Bot Manager Ruleset
8383

84-
By default, the Azure Front Door WAF deploys with the latest version of our Bot Manager ruleset. This ruleset categories bot traffic into good, bad, and unknown bots. The bot signatures behind this ruleset are managed by the WAF platform and are updated dynamically.
84+
By default, the Azure Front Door WAF deploys with the latest version of our Bot Manager ruleset. This ruleset categorizes bot traffic into good, bad, and unknown bots. The bot signatures behind this ruleset are managed by the WAF platform and are updated dynamically.
8585

8686
Learn more: [What is Azure Web Application Firewall on Azure Front Door?](../web-application-firewall/afds/afds-overview.md#bot-protection-rule-set)
8787

@@ -95,7 +95,7 @@ Learn more:
9595

9696
### Detection and Prevention modes
9797

98-
When you create WAF policy, the policy starts in Detection mode. We recommend you leave the WAF Detection mode while you tune the WAF for your traffic. In this mode, WAF doesn't block requests. Instead, requests that match the WAF rules are logged by the WAF once logging is enabled.
98+
When you create a WAF policy, the policy starts in "Detection mode." We recommend you leave the WAF policy in Detection mode while you tune the WAF for your traffic. In this mode, WAF doesn't block requests. Instead, requests that match the WAF rules are logged by the WAF once logging is enabled.
9999

100100
Enable logging: [Azure Web Application Firewall monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md#logs-and-diagnostics)
101101

@@ -113,17 +113,17 @@ AzureDiagnostics
113113
| project RuleID=ruleName_s, DetailMsg=details_msg_s, Action=action_s, Mode=policyMode_s, DetailData=details_data_s
114114
```
115115

116-
![Screenshot of blocked requests.](./media/partner-web-application-firewall/blocked-requests-query.png)
117-
118-
![Screenshot of blocked requests details, such as Rule ID, Action, Mode, etc.](./media/partner-web-application-firewall/blocked-requests-details.png)
116+
|RuleID|DetailMsg|Action|Mode|DetailData|
117+
|---|---|---|---|---|
118+
|DefaultRuleSet-1.0-SQLI-942430|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Block|detection|Matched Data: CfDJ8KQ8bY6D|
119119

120120
Review the WAF logs to determine if policy rules cause false positives. Then, exclude the WAF rules based on the WAF logs.
121121

122122
Learn more
123123
- [Configure WAF exclusion lists for Azure Front Door](../web-application-firewall/afds/waf-front-door-exclusion-configure.md)
124124
- [Web application firewall exclusion lists in Azure Front Door](../web-application-firewall/afds/waf-front-door-exclusion.md)
125125

126-
Once you have logging set up and your WAF is receiving traffic, you can check the efficacy of your bot manager rules at dealing with bot traffic. The following query shows actions taken by your bot manager ruleset by category of bot. While in detection mode, the WAF only takes log actions on bot traffic but, once you switch to prevention mode, the WAF starts taking additional actions to block unwanted bot traffic.
126+
Once logging is set up and your WAF is receiving traffic, you can assess the effectiveness of your bot manager rules in handling bot traffic. The following query shows the actions taken by your bot manager ruleset, categorized by bot type. While in detection mode, the WAF logs bot traffic actions only. However, once switched to prevention mode, the WAF begins actively blocking unwanted bot traffic.
127127

128128
```json
129129
AzureDiagnostics
@@ -140,12 +140,12 @@ AzureDiagnostics
140140

141141
To see WAF take action on request traffic, select **Switch to prevention mode** from the Overview page, which changes the mode from Detection to Prevention. Requests that match the rules in the DRS are blocked and logged in the WAF logs. The WAF takes the prescribed action when a request matches one, or more, rules in the DRS and log the results. By default, the DRS is set to anomaly scoring mode; this means that the WAF doesn't take any action on a request unless the anomaly score threshold is met.
142142

143-
Learn more: Anomaly scoring ([Azure Web Application Firewall DRS rule groups and rules](../web-application-firewall/afds/waf-front-door-drs.md#anomaly-scoring-mode))
143+
Learn more: Anomaly scoring [Azure Web Application Firewall DRS rule groups and rules](../web-application-firewall/afds/waf-front-door-drs.md#anomaly-scoring-mode)
144144

145145
To revert to Detection mode, select **Switch to detection mode** from the Overview page.
146146

147147
## Next steps
148148

149-
* [Azure Web Application Firewall monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md)
150-
* [Web application firewall exclusion lists in Azure Front Door](../web-application-firewall/afds/waf-front-door-exclusion.md)
149+
* [Azure Web Application Firewall monitoring and logging](../web-application-firewall/ag/create-waf-policy-ag.md)
150+
* [Web application firewall exclusion lists in Azure Front Door](../web-application-firewall/afds/waf-front-door-tuning.md)
151151
* [Best practices for Azure Web Application Firewall in Azure Front Door](../web-application-firewall/afds/waf-front-door-best-practices.md)

0 commit comments

Comments
 (0)