Skip to content

Commit d4806aa

Browse files
Update articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md
Co-authored-by: Luke <[email protected]>
1 parent f9fc3a9 commit d4806aa

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/afds/waf-sensitive-data-protection-configure-frontdoor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following table shows examples of log scrubbing rules that can be used to pr
2929
| Request Body JSON Arg Names | Equals | JsonValue | {"matchVariableName":"JsonValue:key","matchVariableValue":"****"} |
3030
| Query String Arg Names | Equals | foo | {"matchVariableName":"QueryParamValue:foo","matchVariableValue":"****"} |
3131
| Request IP Address* | Equals Any | NULL | {"matchVariableName":"ClientIP","matchVariableValue":"****"} |
32-
|Request URI|EqualAny|||
32+
| Request URI | Equals Any | NULL | {"matchVariableName":"URI","matchVariableValue":"****"} |
3333

3434
\* Request IP Address and Request URI rules only support the *equals any* operator and scrubs all instances of the requestor's IP address that appears in the WAF logs.
3535

0 commit comments

Comments
 (0)