You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/ag-overview.md
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,18 +111,22 @@ Three bot categories are supported:
111
111
112
112
-**Bad**
113
113
114
-
Bad bots include bots from malicious IP addresses and bots that falsify their identities. Bad bots with malicious IPs are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise.
114
+
Bad bots are bots with malicious IP addresses and bots that have falsified their identities. Bad bots includes malicious IP addresses that are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise and IP reputation feeds. Bad bots also include bots that identify themselves as good bots but their IP addresses don’t belong to legitimate bot publishers.
115
115
-**Good**
116
116
117
-
Good bots include validated search engines such as Googlebot, bingbot, and other trusted user agents.
117
+
Good Bots are trusted user agents. Good bot rules are categorized into multiple categories to provide granular control over WAF policy configuration. These categories include:
118
+
- verified search engine bots (such as Googlebot and Bingbot)
119
+
- validated link checker bots
120
+
- verified social media bots (such as Facebookbot and LinkedInBot)
121
+
- verified advertising bots
122
+
- verified content checker bots
123
+
- validated miscellaneous bots.
118
124
119
125
-**Unknown**
120
126
121
-
Unknown bots are classified via published user agents without more validation. For example, market analyzer, feed fetchers, and data collection agents. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
127
+
Unknown bots are user agents without additional validation. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
122
128
123
-
The WAF platform actively manages and dynamically updates bot signatures.
124
-
125
-
:::image type="content" source="../media/ag-overview/bot-rule-set.png" alt-text="Screenshot of bot rule set.":::
129
+
The WAF platform actively manages and dynamically updates the bot signatures.
126
130
127
131
You can assign Microsoft_BotManagerRuleSet_1.0 by using the **Assign** option under **Managed Rulesets**:
128
132
@@ -132,6 +136,7 @@ When Bot protection is enabled, it blocks, allows, or logs incoming requests tha
132
136
133
137
You can access WAF logs from a storage account, event hub, log analytics, or send logs to a partner solution.
134
138
139
+
For more information about Application Gateway bot protection, see [Azure Web Application Firewall on Azure Application Gateway bot protection overview](bot-protection-overview.md).
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md
+59-12Lines changed: 59 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -217,15 +217,25 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
217
217
|**[crs_42_tight_security](#crs42)**|Protect against path-traversal attacks|
218
218
|**[crs_45_trojans](#crs45)**|Protect against backdoor trojans|
219
219
220
-
### Bot rules
220
+
### Bot Manager 1.0
221
221
222
-
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
222
+
The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots.
The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection.
233
+
234
+
|Rule group|Description|
235
+
|---|---|
236
+
|[BadBots](#bot11-100)|Protect against bad bots|
237
+
|[GoodBots](#bot11-200)|Identify good bots|
238
+
|[UnknownBots](#bot11-300)|Identify unknown bots|
229
239
230
240
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
231
241
@@ -1475,18 +1485,18 @@ The following rule groups and rules are available when using Web Application Fir
1475
1485
|950921|Backdoor access|
1476
1486
|950922|Backdoor access|
1477
1487
1478
-
# [Bot rules](#tab/bot)
1488
+
# [Bot Manager 1.0](#tab/bot)
1479
1489
1480
-
## <aname="bot"></a> Bot Manager rule sets
1490
+
## <aname="bot"></a> 1.0 rule sets
1481
1491
1482
1492
### <aname="bot100"></a> Bad bots
1483
1493
|RuleId|Description|
1484
1494
|---|---|
1485
1495
|Bot100100|Malicious bots detected by threat intelligence|
1486
1496
|Bot100200|Malicious bots that have falsified their identity|
1487
-
1488
-
Bot100100 scans both client IP addresses and the IPs in the X-Forwarded-For header.
1489
1497
1498
+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1499
+
1490
1500
### <aname="bot200"></a> Good bots
1491
1501
|RuleId|Description|
1492
1502
|---|---|
@@ -1498,13 +1508,50 @@ The following rule groups and rules are available when using Web Application Fir
1498
1508
|---|---|
1499
1509
|Bot300100|Unspecified identity|
1500
1510
|Bot300200|Tools and frameworks for web crawling and attacks|
1501
-
|Bot300300|Generalpurpose HTTP clients and SDKs|
1511
+
|Bot300300|General-purpose HTTP clients and SDKs|
1502
1512
|Bot300400|Service agents|
1503
1513
|Bot300500|Site health monitoring services|
1504
1514
|Bot300600|Unknown bots detected by threat intelligence|
1505
1515
|Bot300700|Other bots|
1506
1516
1507
-
Bot300600 scans both client IP addresses and the IPs in the X-Forwarded-For header.
1517
+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1518
+
1519
+
# [Bot Manager 1.1](#tab/bot11)
1520
+
1521
+
## <aname="bot11"></a> 1.1 rule sets
1522
+
1523
+
### <aname="bot11-100"></a> Bad bots
1524
+
|RuleId|Description|
1525
+
|---|---|
1526
+
|Bot100100|Malicious bots detected by threat intelligence|
1527
+
|Bot100200|Malicious bots that have falsified their identity|
1528
+
|Bot100300|High risk bots detected by threat intelligence|
1529
+
1530
+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1531
+
1532
+
### <aname="bot11-200"></a> Good bots
1533
+
|RuleId|Description|
1534
+
|---|---|
1535
+
|Bot200100|Search engine crawlers|
1536
+
|Bot200200|Verified miscellaneous bots|
1537
+
|Bot200300|Verified link checker bots|
1538
+
|Bot200400|Verified social media bots|
1539
+
|Bot200500|Verified content fetchers|
1540
+
|Bot200600|Verified feed fetchers|
1541
+
|Bot200700|Verified advertising bots|
1542
+
1543
+
### <aname="bot11-300"></a> Unknown bots
1544
+
|RuleId|Description|
1545
+
|---|---|
1546
+
|Bot300100|Unspecified identity|
1547
+
|Bot300200|Tools and frameworks for web crawling and attacks|
1548
+
|Bot300300|General-purpose HTTP clients and SDKs|
1549
+
|Bot300400|Service agents|
1550
+
|Bot300500|Site health monitoring services|
1551
+
|Bot300600|Unknown bots detected by threat intelligence. This rule also includes IP addresses matched to the Tor network.|
1552
+
|Bot300700|Other bots|
1553
+
1554
+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/bot-protection-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ You can enable a managed bot protection rule set for your WAF to block or log re
18
18
19
19
## Use with OWASP rulesets
20
20
21
-
You can use the Bot Protection ruleset alongside any of the OWASP rulesets with the Application Gateway WAF v2 SKU. Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains another rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_1.0**, and you can enable or disable it like the other OWASP rules.
21
+
You can use the Bot Protection ruleset alongside any of the OWASP rulesets with the Application Gateway WAF v2 SKU. Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains another rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_1.1**, and you can enable or disable it like the other OWASP rules.
22
22
23
23
:::image type="content" source="../media/bot-protection-overview/bot-ruleset.png" alt-text="Screenshot show bot protection ruleset." lightbox="../media/bot-protection-overview/bot-ruleset.png":::
0 commit comments