Skip to content

Commit b5d2c90

Browse files
Merge pull request #217563 from vhorne/waf-ag-bot-pro
add bot protection rule set to AG
2 parents 78a2afb + 8307456 commit b5d2c90

File tree

4 files changed

+66
-5
lines changed

4 files changed

+66
-5
lines changed

articles/web-application-firewall/ag/ag-overview.md

Lines changed: 28 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article provides an overview of Web Application Firewall (WAF)
55
services: web-application-firewall
66
author: vhorne
77
ms.service: web-application-firewall
8-
ms.date: 05/06/2022
8+
ms.date: 11/08/2022
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -101,11 +101,35 @@ The geomatch operator is now available for custom rules. See [geomatch custom ru
101101

102102
For more information on custom rules, see [Custom Rules for Application Gateway.](custom-waf-rules-overview.md)
103103

104-
### Bot mitigation
104+
### Bot protection rule set
105105

106-
A managed Bot protection rule set can be enabled for your WAF to block or log requests from known malicious IP addresses, alongside the managed ruleset. The IP addresses are sourced from the Microsoft Threat Intelligence feed. Intelligent Security Graph powers Microsoft threat intelligence and is used by multiple services including Microsoft Defender for Cloud.
106+
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
107+
108+
Three bot categories are supported:
109+
110+
- **Bad**
111+
112+
Bad bots include bots from malicious IP addresses and bots that have falsified their identities. Bad bots with malicious IPs are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise.
113+
- **Good**
114+
115+
Good bots include validated search engines such as Googlebot, bingbot, and other trusted user agents.
116+
117+
- **Unknown**
118+
119+
Unknown bots are classified via published user agents without additional validation. For example, market analyzer, feed fetchers, and data collection agents. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
120+
121+
Bot signatures are managed and dynamically updated by the WAF platform.
122+
123+
:::image type="content" source="../media/ag-overview/bot-rule-set.png" alt-text="Screenshot of bot rule set.":::
124+
125+
You may assign Microsoft_BotManagerRuleSet_1.0 by using the **Assign** option under **Managed Rulesets**:
126+
127+
:::image type="content" source="../media/ag-overview/assign-managed-rule-sets.png" alt-text="Screenshot of Assign managed rule sets.":::
128+
129+
If Bot protection is enabled, incoming requests that match bot rules are blocked, allowed, or logged based on the configured action. Malicious bots are blocked, verified search engine crawlers are allowed, unknown search engine crawlers are blocked, and unknown bots are logged by default. You can set custom actions to block, allow, or log for different types of bots.
130+
131+
You can access WAF logs from a storage account, event hub, log analytics, or send logs to a partner solution.
107132

108-
If Bot Protection is enabled, incoming requests that match Malicious Bot's client IPs are logged in the Firewall log, see more information below. You may access WAF logs from storage account, event hub, or log analytics.
109133

110134
### WAF modes
111135

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 38 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This page provides information on web application firewall CRS rule
55
services: web-application-firewall
66
author: vhorne
77
ms.service: web-application-firewall
8-
ms.date: 06/21/2022
8+
ms.date: 11/08/2022
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -145,6 +145,16 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
145145
|**[crs_42_tight_security](#crs42)**|Protect against path-traversal attacks|
146146
|**[crs_45_trojans](#crs45)**|Protect against backdoor trojans|
147147

148+
### Bot rules
149+
150+
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
151+
152+
|Rule group|Description|
153+
|---|---|
154+
|**[BadBots](#bot100)**|Protect against bad bots|
155+
|**[GoodBots](#bot200)**|Identify good bots|
156+
|**[UnknownBots](#bot300)**|Identify unknown bots|
157+
148158
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
149159

150160
# [OWASP 3.2](#tab/owasp32)
@@ -1114,6 +1124,33 @@ The following rule groups and rules are available when using Web Application Fir
11141124
|950921|Backdoor access|
11151125
|950922|Backdoor access|
11161126

1127+
# [Bot rules](#tab/bot)
1128+
1129+
## <a name="bot"></a> Bot Manager rule sets
1130+
1131+
### <a name="bot100"></a> Bad bots
1132+
|RuleId|Description|
1133+
|---|---|
1134+
|Bot100100|Malicious bots detected by threat intelligence|
1135+
|Bot100200|Malicious bots that have falsified their identity|
1136+
1137+
### <a name="bot200"></a> Good bots
1138+
|RuleId|Description|
1139+
|---|---|
1140+
|Bot200100|Search engine crawlers|
1141+
|Bot200200|Unverified search engine crawlers|
1142+
1143+
### <a name="bot300"></a> Unknown bots
1144+
|RuleId|Description|
1145+
|---|---|
1146+
|Bot300100|Unspecified identity|
1147+
|Bot300200|Tools and frameworks for web crawling and attacks|
1148+
|Bot300300|General purpose HTTP clients and SDKs|
1149+
|Bot300400|Service agents|
1150+
|Bot300500|Site health monitoring services|
1151+
|Bot300600|Unknown bots detected by threat intelligence<br />(This rule also includes IP addresses matched to the Tor network.)|
1152+
|Bot300700|Other bots|
1153+
11171154
---
11181155

11191156
## Next steps
84.2 KB
Loading
125 KB
Loading

0 commit comments

Comments
 (0)