Skip to content

Commit cec00dd

Browse files
committed
freshness review
1 parent bd2db4b commit cec00dd

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/web-application-firewall/ag/policy-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Azure Web Application Firewall (WAF) policy overview
33
description: This article is an overview of Web Application Firewall (WAF) global, per-site, and per-URI policies.
44
services: web-application-firewall
55
ms.topic: concept-article
6-
author: winthrop28
6+
author: vhorne
77
ms.service: azure-web-application-firewall
8-
ms.date: 10/06/2023
8+
ms.date: 01/14/2025
99
ms.author: victorh
1010
---
1111

@@ -42,15 +42,15 @@ Say you have three sites: contoso.com, fabrikam.com, and adatum.com all behind t
4242

4343
You can apply a global policy to the WAF, with some basic settings, exclusions, or custom rules if necessary to stop some false positives from blocking traffic. In this case, there's no need to have global SQL injection rules running because fabrikam.com and contoso.com are static pages with no SQL backend. So you can disable those rules in the global policy.
4444

45-
This global policy is suitable for contoso.com and fabrikam.com, but you need to be more careful with adatum.com where sign-in information and payments are handled. You can apply a per-site policy to the adatum listener and leave the SQL rules running. Also assume there's a cookie blocking some traffic, so you can create an exclusion for that cookie to stop the false positive.
45+
This global policy is suitable for contoso.com and fabrikam.com, but you need to be more careful with adatum.com where sign-in information and payments are handled. You can apply a per-site policy to the Adatum listener and leave the SQL rules running. Also assume there's a cookie blocking some traffic, so you can create an exclusion for that cookie to stop the false positive.
4646

4747
The adatum.com/payments URI is where you need to be careful. So apply another policy on that URI and leave all rules enabled, and also remove all exclusions.
4848

4949
In this example, you have a global policy that applies to two sites. You have a per-site policy that applies to one site, and then a per-URI policy that applies to one specific path-based rule. See [Configure per-site WAF policies using Azure PowerShell](per-site-policies.md) for the corresponding PowerShell for this example.
5050

5151
## Existing WAF configurations
5252

53-
All new Web Application Firewall's WAF settings (custom rules, managed rule set configurations, exclusions, and so on.) exist in a WAF policy. If you have an existing WAF, these settings may still exist in your WAF configuration. For more information about moving to the new WAF policy, [Migrate WAF Config to a WAF Policy](./migrate-policy.md).
53+
All new Web Application Firewall's WAF settings (custom rules, managed rule set configurations, exclusions, and so on) exist in a WAF policy. If you have an existing WAF, these settings might still exist in your WAF configuration. For more information about moving to the new WAF policy, [Migrate WAF Config to a WAF Policy](./migrate-policy.md).
5454

5555

5656
## Next steps

0 commit comments

Comments
 (0)