Skip to content

Commit a873ab0

Browse files
committed
date and some cleanup
1 parent 4e04317 commit a873ab0

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/application-gateway/waf-tshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Troubleshoot the web application firewall for Azure Application Gateway
3-
description: This article provides troubleshooting information for web application firewall (WAF) for Application Gateway
2+
title: Troubleshoot the Web Application Firewall for Azure Application Gateway
3+
description: This article provides troubleshooting information for Web Application Firewall (WAF) for Azure Application Gateway
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
7-
ms.date: 6/4/2019
7+
ms.date: 6/11/2019
88
ms.author: ant
99
ms.topic: conceptual
1010
---
1111

12-
# Troubleshoot web application firewall for Azure Application Gateway
12+
# Troubleshoot Web Application Firewall (WAF) for Azure Application Gateway
1313

14-
There are a few things you can do if requests that should pass through your web application firewall (WAF) are blocked.
14+
There are a few things you can do if requests that should pass through your Web Application Firewall (WAF) are blocked.
1515

1616
First, ensure you’ve read the [WAF overview](waf-overview.md) and the [WAF configuration](application-gateway-waf-configuration.md) documents. Also, make sure you’ve enabled [WAF monitoring](application-gateway-diagnostics.md) These articles explain how the WAF functions, how the WAF rule sets work, and how to access WAF logs.
1717

@@ -282,7 +282,7 @@ In this example, you can see that you have four rules with the same TransactionI
282282
- }
283283
```
284284

285-
With your knowledge of how the CRS rule sets work, and that the CRS ruleset 3.0 works with an anomaly scoring system (see more here https://docs.microsoft.com/en-us/azure/application-gateway/waf-overview) you know that the bottom two rules with the **action: Blocked** property are blocking based on the total anomaly score. The rules to focus on are the top two.
285+
With your knowledge of how the CRS rule sets work, and that the CRS ruleset 3.0 works with an anomaly scoring system (see [Web application firewall for Azure Application Gateway](waf-overview.md)) you know that the bottom two rules with the **action: Blocked** property are blocking based on the total anomaly score. The rules to focus on are the top two.
286286

287287
The first entry is logged because the user used a numeric IP address to navigate to the Application Gateway, which can be ignored in this case.
288288

0 commit comments

Comments
 (0)