Skip to content

Commit b1f23c2

Browse files
committed
Start AG WAF JS challenge
1 parent ae18956 commit b1f23c2

File tree

4 files changed

+6
-3
lines changed

4 files changed

+6
-3
lines changed
File renamed without changes.

articles/web-application-firewall/ag/application-gateway-waf-metrics.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,12 @@ New WAF metrics are only available for Core Rule Set 3.2 or greater, or with bot
3838
|**WAF Managed Rule Matches**|Count of total managed rule matches| Action, Country/Region, Mode, Policy Name, Policy Scope, Rule Group, Rule ID, Rule Set Name|
3939
|**WAF Custom Rule Matches**|Count of custom rule matches| Action, Country/Region, Mode, Policy Name, Policy Scope, Rule Name|
4040
|**WAF Bot Protection Matches**<sup>1</sup>|Count of total bot protection rule matches that have been blocked or logged from malicious IP addresses. The IP addresses are sourced from the Microsoft Threat Intelligence feed.| Action, Country/Region, Bot Type, Mode, Policy Name, Policy Scope|
41+
|**WAF JS Challenge Request Count**|Count the number of requests that match JS Challenge WAF rules.|Action, Policy Name, Policy Scope, Rule<sup>2</sup>|
4142

4243
<sup>1</sup> Only Bot Manager Rule Set 0.1 will be displayed under “WAF Bot Protection Matches”. Requests matching Bot Manager Rule Set 1.0 will increase “WAF Total Requests” metrics, not “WAF Bot Protection Matches”.
4344

45+
<sup>2</sup> Rule name for custom rules and Rule ID for the Bot Manager Rule Set.
46+
4447
For metrics supported by Application Gateway V2 SKU, see [Application Gateway v2 metrics](../../application-gateway/application-gateway-metrics.md#metrics-supported-by-application-gateway-v2-sku)
4548

4649
## Application Gateway WAF v1 Metrics

articles/web-application-firewall/ag/web-application-firewall-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ The firewall log is generated only if you have enabled it for each application g
225225
|ruleSetVersion | Rule set version used. Available values are 2.2.9 and 3.0. |
226226
|ruleId | Rule ID of the triggering event. |
227227
|message | User-friendly message for the triggering event. More details are provided in the details section. |
228-
|action | **Policy Mode:** Detection</br> - **Detected** - This is the only action for the WAF when in detection mode. All the conditions for a given rule were matched and the request was logged then passed to the backend.</br></br>**Policy Mode:** Prevention</br> - **Allowed** - All conditions were matched for a given rule and the request was passed to the backend.</br> - **Blocked** - All of the conditions were matched for a given rule and the request was blocked.</br> - **Matched** - One/more conditions were matched for a given rule, but the decision to block or pass the request will need further evaluation and will be evaluated based on the final anomaly scoring rule. |
228+
|action |**Policy Mode:** Detection</br>- **Detected** - This is the only action for the WAF when in detection mode. All the conditions for a given rule were matched and the request was logged then passed to the backend.</br></br>**Policy Mode:** Prevention</br> - **Allowed** - All conditions were matched for a given rule and the request was passed to the backend.</br> - **Blocked** - All of the conditions were matched for a given rule and the request was blocked.</br> - **Matched** - One/more conditions were matched for a given rule, but the decision to block or pass the request will need further evaluation and will be evaluated based on the final anomaly scoring rule.<br><br>**Policy Mode:** JS challenge<br>- **JSChallengeIssued**: Issued due to missing/invalid challenge clearance, missing answer.<br><br>This log is created when a client requests access to a web application for the first time and has not been challenged previously. This client receives the JS challenge page and proceeds to compute the JS challenge. Upon successful computation, the client is granted the validity cookie.<br><br>- **JSChallengePass**: Passed due to valid challenge answer.<br><br>This log is created when a client solves the JS challenge and resubmits the request with the correct answer. In this case, Azure WAF validates the cookie and proceeds to process the remaining rules without generating another JS challenge.<br><br>- **JSChallengeValid**: Logged/passthrough due to valid challenge<br><br>This log is created when a client has previously solved a challenge. In this case, Azure WAF logs the request and proceeds to process the remaining rules.<br><br>- **JSChallengeBlock**: Blocked<br><br>This log is created when a JS challenge computation fails. |
229229
|site | Site for which the log was generated. Currently, only Global is listed because rules are global.|
230230
|details | Details of the triggering event. |
231231
|details.message | Description of the rule. |

articles/web-application-firewall/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,8 @@ items:
8787
href: ./afds/waf-front-door-rate-limit.md
8888
- name: Geo-filtering
8989
href: ./afds/waf-front-door-geo-filtering.md
90+
- name: JavaScript challenge
91+
href: ./afds/waf-javascript-challenge.md
9092
- name: Best practices
9193
href: ./afds/waf-front-door-best-practices.md
9294
- name: FAQ
@@ -101,8 +103,6 @@ items:
101103
href: waf-copilot.md
102104
- name: WAF and Azure Policy
103105
href: ./shared/waf-azure-policy.md
104-
- name: JavaScript challenge
105-
href: waf-javascript-challenge.md
106106
- name: How-to guides
107107
items:
108108
- name: Application Gateway

0 commit comments

Comments
 (0)