You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/ag-overview.md
+28-4Lines changed: 28 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: This article provides an overview of Web Application Firewall (WAF)
5
5
services: web-application-firewall
6
6
author: vhorne
7
7
ms.service: web-application-firewall
8
-
ms.date: 05/06/2022
8
+
ms.date: 11/08/2022
9
9
ms.author: victorh
10
10
ms.topic: conceptual
11
11
---
@@ -101,11 +101,35 @@ The geomatch operator is now available for custom rules. See [geomatch custom ru
101
101
102
102
For more information on custom rules, see [Custom Rules for Application Gateway.](custom-waf-rules-overview.md)
103
103
104
-
### Bot mitigation
104
+
### Bot protection rule set
105
105
106
-
A managed Bot protection rule set can be enabled for your WAF to block or log requests from known malicious IP addresses, alongside the managed ruleset. The IP addresses are sourced from the Microsoft Threat Intelligence feed. Intelligent Security Graph powers Microsoft threat intelligence and is used by multiple services including Microsoft Defender for Cloud.
106
+
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
107
+
108
+
Three bot categories are supported:
109
+
110
+
-**Bad**
111
+
112
+
Bad bots include bots from malicious IP addresses and bots that have falsified their identities. Bad bots with malicious IPs are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise.
113
+
-**Good**
114
+
115
+
Good bots include validated search engines such as Googlebot, bingbot, and other trusted user agents.
116
+
117
+
-**Unknown**
118
+
119
+
Unknown bots are classified via published user agents without additional validation. For example, market analyzer, feed fetchers, and data collection agents. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
120
+
121
+
Bot signatures are managed and dynamically updated by the WAF platform.
122
+
123
+
:::image type="content" source="../media/ag-overview/bot-rule-set.png" alt-text="Screenshot of bot rule set.":::
124
+
125
+
You may assign Microsoft_BotManagerRuleSet_1.0 by using the **Assign** option under **Managed Rulesets**:
126
+
127
+
:::image type="content" source="../media/ag-overview/assign-managed-rule-sets.png" alt-text="Screenshot of Assign managed rule sets.":::
128
+
129
+
If Bot protection is enabled, incoming requests that match bot rules are blocked, allowed, or logged based on the configured action. Malicious bots are blocked, verified search engine crawlers are allowed, unknown search engine crawlers are blocked, and unknown bots are logged by default. You can set custom actions to block, allow, or log for different types of bots.
130
+
131
+
You can access WAF logs from a storage account, event hub, log analytics, or send logs to a partner solution.
107
132
108
-
If Bot Protection is enabled, incoming requests that match Malicious Bot's client IPs are logged in the Firewall log, see more information below. You may access WAF logs from storage account, event hub, or log analytics.
0 commit comments