Skip to content

Commit df6bdb3

Browse files
committed
change file path
1 parent 9139fba commit df6bdb3

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/web-application-firewall/afds/waf-front-door-exclusion.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ ms.topic: conceptual
1414
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. For example, Active Directory inserts tokens that are used for authentication. These tokens can contain special characters that may trigger a false positive from the WAF rules. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. An exclusion list can be configured using [PowserShell](https://docs.microsoft.com/powershell/module/az.frontdoor/New-AzFrontDoorWafManagedRuleExclusionObject?view=azps-3.5.0), [Azure CLI](https://docs.microsoft.com/cli/azure/ext/front-door/network/front-door/waf-policy/managed-rules/exclusion?view=azure-cli-latest#ext-front-door-az-network-front-door-waf-policy-managed-rules-exclusion-add), [Rest API](https://docs.microsoft.com/rest/api/frontdoorservice/webapplicationfirewall/policies/createorupdate), or the Azure portal. The following example shows the Azure portal configuration.
1515
## Configure exclusion lists using the Azure portal
1616
**Manage exclusion** is accessible from WAF managed rules portal:
17-
![Manage exclusion](../media/waf-front-door-exclusion/exclusion1.PNG)
18-
![Manage exclusion_add](../media/waf-front-door-exclusion/exclusion2.PNG)
17+
![Manage exclusion](../media/waf-front-door-exclusion/exclusion1.png)
18+
![Manage exclusion_add](../media/waf-front-door-exclusion/exclusion2.png)
1919

2020
An example exclusion list:
21-
![Manage exclusion_define](../media/waf-front-door-exclusion/exclusion3.PNG)
21+
![Manage exclusion_define](../media/waf-front-door-exclusion/exclusion3.png)
2222

2323
This example excludes the value in the *user* header field. A valid request may include the *user* field that contains a string which triggers a SQL injection rule. You can exclude the *user* parameter in this case so that the WAF rule doesn't evaluate anything in the field.
2424

0 commit comments

Comments
 (0)