Skip to content

Commit df593f9

Browse files
committed
add log entry
1 parent be12231 commit df593f9

File tree

1 file changed

+28
-1
lines changed

1 file changed

+28
-1
lines changed

articles/web-application-firewall/ag/bot-protection-overview.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article provides an overview of web application firewall (WAF)
55
services: web-application-firewall
66
author: winthrop28
77
ms.service: web-application-firewall
8-
ms.date: 02/04/2020
8+
ms.date: 05/20/2020
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -29,6 +29,33 @@ You can use the Bot Protection ruleset alongside any of the OWASP rulesets (2.2.
2929

3030
The bot mitigation ruleset list of known bad IP addresses updates multiple times per day from the Microsoft Threat Intelligence feed to stay in sync with the bots. Your web applications are continuously protected even as the bot attack vectors change.
3131

32+
## Log example
33+
34+
Here's an example log entry for bot protection:
35+
36+
```
37+
{
38+
"timeStamp": "0000-00-00T00:00:00+00:00",
39+
"resourceId": "appgw",
40+
"operationName": "ApplicationGatewayFirewall",
41+
"category": "ApplicationGatewayFirewallLog",
42+
"properties": {
43+
"instanceId": "vm1",
44+
"clientIp": "1.2.3.4",
45+
"requestUri": "/hello.php?arg1=aaaaaaabccc",
46+
"ruleSetType": "MicrosoftBotProtection",
47+
"message": "IPReputationTriggered",
48+
"action": "Blocked",
49+
"hostname": "example.com",
50+
"transactionId": "abc",
51+
"policyId": "waf policy 1",
52+
"policyScope": "Global",
53+
"policyScopeName": "Default Policy",
54+
"engine": "Azwaf"
55+
}
56+
}
57+
```
58+
3259
## Next steps
3360

3461
- [Configure bot protection for Web Application Firewall on Azure Application Gateway (Preview)](bot-protection.md)

0 commit comments

Comments
 (0)