Skip to content

Commit cbc75c4

Browse files
authored
Merge pull request #299062 from halkazwini/waf-scrub
Waf log scrubbing update
2 parents 04fad00 + e8df5b9 commit cbc75c4

File tree

2 files changed

+24
-22
lines changed

2 files changed

+24
-22
lines changed

articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: How to mask sensitive data on Azure Web Application Firewall on Azure Front Door
3-
description: Learn how to mask sensitive data on Azure Web Application Firewall on Azure Front Door.
3+
description: Learn how to mask sensitive data on Azure Web Application Firewall (WAF) for Azure Front Door using the log scrubbing feature.
44
author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-web-application-firewall
77
ms.topic: how-to
8-
ms.date: 06/24/2024
8+
ms.date: 04/30/2025
99
---
1010

1111
# How to mask sensitive data on Azure Web Application Firewall on Azure Front Door
@@ -17,25 +17,27 @@ The Web Application Firewall's (WAF) Log Scrubbing tool helps you remove sensiti
1717
1818
The following table shows examples of log scrubbing rules that can be used to protect your sensitive data:
1919

20-
| Match Variable | Operator | Selector | What gets scrubbed |
20+
| Match variable | Operator | Selector | What gets scrubbed |
2121
| --- | --- | --- | --- |
2222
| Request Header Names | Equals | keytoblock | {"matchVariableName":"HeaderValue:keytoblock","matchVariableValue":"****"} |
2323
| Request Cookie Names | Equals | cookietoblock | {"matchVariableName":"CookieValue:cookietoblock","matchVariableValue":"****"} |
24-
| Request Post Arg Names | Equals | var | {"matchVariableName":"PostParamValue:var","matchVariableValue":"****"} |
25-
| Request Body JSON Arg Names | Equals | JsonValue | {"matchVariableName":"JsonValue:key","matchVariableValue":"****"} |
24+
| Request Body Post Arg Names <sup>1</sup> | Equals | var | {"matchVariableName":"PostParamValue:var","matchVariableValue":"****"} |
25+
| Request Body JSON Arg Names <sup>1</sup> | Equals | JsonValue | {"matchVariableName":"JsonValue:key","matchVariableValue":"****"} |
2626
| Query String Arg Names | Equals | foo | {"matchVariableName":"QueryParamValue:foo","matchVariableValue":"****"} |
27-
| Request IP Address* | Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
27+
| Request IP Address <sup>2</sup> | Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
2828
| Request URI | Equals Any | NULL | {"matchVariableName":"URI","matchVariableValue":"****"} |
2929

30-
\* Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
30+
<sup>1</sup> If a request triggers a rule that scans the request body, and the content type is either `application/x-www-form-urlencoded` or `application/json`, the WAF will scrub all request details from the logs to prevent any potential storage of PII.
31+
32+
<sup>2</sup> Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
3133

3234
For more information, see [What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?](waf-sensitive-data-protection-frontdoor.md)
3335

34-
## Enable Sensitive Data Protection
36+
## Enable sensitive data protection
3537

3638
Use the following information to enable and configure Sensitive Data Protection.
3739

38-
#### [Portal](#tab/browser)
40+
#### [Portal](#tab/portal)
3941

4042
To enable Sensitive Data Protection:
4143

@@ -56,7 +58,7 @@ Repeat to add more rules.
5658

5759
Use the following Azure PowerShell commands to create and configure Log Scrubbing rules for Sensitive Data Protection:
5860

59-
```azurepowershell
61+
```azurepowershell-interactive
6062
New-AzFrontDoorWafLogScrubbingRuleObject -MatchVariable <String> -SelectorMatchOperator <String>
6163
-State <String> [-Selector <String>] [-DefaultProfile <IAzureContextContainer>]
6264
[<CommonParameters>]
@@ -65,23 +67,22 @@ New-AzFrontDoorWafLogScrubbingSettingObject -ScrubbingRule <PSFrontDoorWafLogScr
6567
[-DefaultProfile <IAzureContextContainer>] [<CommonParameters>]
6668
```
6769

68-
#### [CLI](#tab/cli)
70+
#### [Azure CLI](#tab/cli)
6971

7072
Use the following Command Line Interface commands to [create and configure](/cli/azure/network/front-door/waf-policy) Log Scrubbing rules for Sensitive Data Protection:
7173

72-
```CLI
74+
```azurecli-interactive
7375
az network front-door waf-policy update -g <MyResourceGroup> -n <MyPolicyName> --log-scrubbing "{scrubbing-rules:[{match-variable:<MatchVariable>,selector-match-operator:<Operator>}],state:<Enabled/Disabled>}"
7476
```
7577

76-
7778
---
7879

79-
## Verify Sensitive Data Protection
80+
## Verify sensitive data protection
8081

8182
To verify your Sensitive Data Protection rules, open the Front Door firewall log and search for _******_ in place of the sensitive fields.
8283

83-
## Next steps
84+
## Related content
8485

86+
- [What is Azure Web Application Firewall on Azure Front Door sensitive data protection?](waf-sensitive-data-protection-frontdoor.md)
8587
- [Azure Web Application Firewall monitoring and logging](../afds/waf-front-door-monitor.md)
8688
- [A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door](https://techcommunity.microsoft.com/t5/azure-network-security-blog/a-closer-look-at-azure-waf-s-data-masking-capabilities-for-azure/ba-p/4167558)
87-

articles/web-application-firewall/afds/waf-sensitive-data-protection-frontdoor.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: Azure Web Application Firewall on Azure Front Door Sensitive Data Protection
3-
description: Learn about Azure Web Application Firewall Azure Front Door Sensitive Data Protection.
2+
title: Web Application Firewall on Front Door Sensitive Data Protection
3+
description: Learn about sensitive data protection in Azure Web Application Firewall (WAF) for Azure Front Door.
44
author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-web-application-firewall
77
ms.topic: concept-article
88
ms.date: 06/24/2024
99
---
1010

11-
# What is Azure Web Application Firewall on Azure Front Door Sensitive Data Protection?
11+
# What is Azure Web Application Firewall on Azure Front Door sensitive data protection?
1212

13-
The Web Application Firewall's (WAF) Log Scrubbing tool helps you remove sensitive data from your WAF logs. It works by using a rules engine that allows you to build custom rules to identify specific portions of a request that contain sensitive information. Once identified, the tool scrubs that information from your logs and replaces it with _*******_.
13+
The Web Application Firewall's (WAF) log scrubbing tool helps you remove sensitive data from your WAF logs. It works by using a rules engine that allows you to build custom rules to identify specific portions of a request that contain sensitive information. Once identified, the tool scrubs that information from your logs and replaces it with _*******_.
1414

1515
> [!NOTE]
1616
> When you enable the log scrubbing feature, Microsoft still retains IP addresses in our internal logs to support critical security features.
@@ -31,7 +31,8 @@ The following fields can be scrubbed from the logs:
3131
- Request URI
3232
- Request IP Address
3333

34-
## Next steps
34+
## Related content
3535

36-
- [How to mask sensitive data on Azure Web Application Firewall on Azure Front Door (preview)](waf-sensitive-data-protection-configure-frontdoor.md)
36+
- [How to mask sensitive data on Azure Web Application Firewall for Azure Front Door](waf-sensitive-data-protection-configure-frontdoor.md)
37+
- [Azure Web Application Firewall monitoring and logging](../afds/waf-front-door-monitor.md)
3738
- [A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door](https://techcommunity.microsoft.com/t5/azure-network-security-blog/a-closer-look-at-azure-waf-s-data-masking-capabilities-for-azure/ba-p/4167558)

0 commit comments

Comments
 (0)