You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Request IP Address*| Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
27
+
| Request IP Address <sup>2</sup>| Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
28
28
| Request URI | Equals Any | NULL | {"matchVariableName":"URI","matchVariableValue":"****"} |
29
29
30
-
\* Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
30
+
<sup>1</sup> If a request triggers a rule that scans the request body, and the content type is either `application/x-www-form-urlencoded` or `application/json`, the WAF will scrub all request details from the logs to prevent any potential storage of PII.
31
+
32
+
<sup>2</sup> Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
31
33
32
34
For more information, see [What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?](waf-sensitive-data-protection-frontdoor.md)
33
35
34
-
## Enable Sensitive Data Protection
36
+
## Enable sensitive data protection
35
37
36
38
Use the following information to enable and configure Sensitive Data Protection.
37
39
38
-
#### [Portal](#tab/browser)
40
+
#### [Portal](#tab/portal)
39
41
40
42
To enable Sensitive Data Protection:
41
43
@@ -56,7 +58,7 @@ Repeat to add more rules.
56
58
57
59
Use the following Azure PowerShell commands to create and configure Log Scrubbing rules for Sensitive Data Protection:
Use the following Command Line Interface commands to [create and configure](/cli/azure/network/front-door/waf-policy) Log Scrubbing rules for Sensitive Data Protection:
To verify your Sensitive Data Protection rules, open the Front Door firewall log and search for _******_ in place of the sensitive fields.
82
83
83
-
## Next steps
84
+
## Related content
84
85
86
+
-[What is Azure Web Application Firewall on Azure Front Door sensitive data protection?](waf-sensitive-data-protection-frontdoor.md)
85
87
-[Azure Web Application Firewall monitoring and logging](../afds/waf-front-door-monitor.md)
86
88
-[A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door](https://techcommunity.microsoft.com/t5/azure-network-security-blog/a-closer-look-at-azure-waf-s-data-masking-capabilities-for-azure/ba-p/4167558)
Copy file name to clipboardExpand all lines: articles/web-application-firewall/afds/waf-sensitive-data-protection-frontdoor.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
---
2
-
title: Azure Web Application Firewall on Azure Front Door Sensitive Data Protection
3
-
description: Learn about Azure Web Application Firewall Azure Front Door Sensitive Data Protection.
2
+
title: Web Application Firewall on Front Door Sensitive Data Protection
3
+
description: Learn about sensitive data protection in Azure Web Application Firewall (WAF) for Azure Front Door.
4
4
author: halkazwini
5
5
ms.author: halkazwini
6
6
ms.service: azure-web-application-firewall
7
7
ms.topic: concept-article
8
8
ms.date: 06/24/2024
9
9
---
10
10
11
-
# What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?
11
+
# What is Azure Web Application Firewall on Azure Front Door sensitive data protection?
12
12
13
-
The Web Application Firewall's (WAF) Log Scrubbing tool helps you remove sensitive data from your WAF logs. It works by using a rules engine that allows you to build custom rules to identify specific portions of a request that contain sensitive information. Once identified, the tool scrubs that information from your logs and replaces it with _*******_.
13
+
The Web Application Firewall's (WAF) log scrubbing tool helps you remove sensitive data from your WAF logs. It works by using a rules engine that allows you to build custom rules to identify specific portions of a request that contain sensitive information. Once identified, the tool scrubs that information from your logs and replaces it with _*******_.
14
14
15
15
> [!NOTE]
16
16
> When you enable the log scrubbing feature, Microsoft still retains IP addresses in our internal logs to support critical security features.
@@ -31,7 +31,8 @@ The following fields can be scrubbed from the logs:
31
31
- Request URI
32
32
- Request IP Address
33
33
34
-
## Next steps
34
+
## Related content
35
35
36
-
-[How to mask sensitive data on Azure Web Application Firewall on Azure Front Door (preview)](waf-sensitive-data-protection-configure-frontdoor.md)
36
+
-[How to mask sensitive data on Azure Web Application Firewall for Azure Front Door](waf-sensitive-data-protection-configure-frontdoor.md)
37
+
-[Azure Web Application Firewall monitoring and logging](../afds/waf-front-door-monitor.md)
37
38
-[A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door](https://techcommunity.microsoft.com/t5/azure-network-security-blog/a-closer-look-at-azure-waf-s-data-masking-capabilities-for-azure/ba-p/4167558)
0 commit comments