Skip to content

Commit b66b238

Browse files
committed
fix attempt for tip
1 parent 47b14fc commit b66b238

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/afds/automated-detection-response-with-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ There are detection query templates for SQLi and XSS attacks in Sentinel for Azu
8787
1. On the right pane, select **Create rule**.
8888
1. Accept all the defaults and click through to **Automated response**. You can edit these settings later to customize the rule.
8989
> [!TIP]
90-
> If you see an error in the rule query, it might be because you don't have any WAF logs in your workspace. You can generate some logs by sending test traffic to your web app. For example, you can simulate a SQLi attack by sending a request like this: `http://x.x.x.x/?text1=%27OR%27%27=%27`. Replace `x.x.x.x` with your Front Door URL.
90+
> If you see an error in the rule query, it might be because you don't have any WAF logs in your workspace. You can generate some logs by sending test traffic to your web app. For example, you can simulate a SQLi attack by sending a request like this: `http://x.x.x.x/?text1=%27OR%27%27=%27`. Replace `x.x.x.x` with your Front Door URL.
9191
9292
1. On the **Automated response** page, select **Add new**.
9393
1. On the **Create new automation rule** page, type a name for the rule.

0 commit comments

Comments
 (0)