Skip to content

Commit eca3a7e

Browse files
Merge pull request #105522 from teresayao/Manganese
update overview with exclusion
2 parents 5806819 + 584dbcd commit eca3a7e

File tree

6 files changed

+52
-1
lines changed

6 files changed

+52
-1
lines changed

articles/web-application-firewall/afds/afds-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ You can configure custom rules WAF as follows:
7272

7373
### Azure-managed rule sets
7474

75-
Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Since such rulesets are managed by Azure, the rules are updated as needed to protect against new attack signatures. At public preview, the Azure-managed Default Rule Set includes rules against the following threat categories:
75+
Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Since such rulesets are managed by Azure, the rules are updated as needed to protect against new attack signatures. Azure-managed Default Rule Set includes rules against the following threat categories:
7676

7777
- Cross-site scripting
7878
- Java attacks
@@ -87,6 +87,8 @@ Azure-managed rule sets provide an easy way to deploy protection against a commo
8787
The version number of the Default Rule Set increments when new attack signatures are added to the rule set.
8888
Default Rule Set is enabled by default in Detection mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions (ALLOW/BLOCK/REDIRECT/LOG) per rule.
8989

90+
Sometimes you may need to omit certain request attributes from a WAF evaluation. A common example is Active Directory-inserted tokens that are used for authentication. You may configure an exclusion list for a managed rule, rule group, or for the entire rule set.
91+
9092
The Default action is to BLOCK. Additionally, custom rules can be configured in the same WAF policy if you wish to bypass any of the pre-configured rules in the Default Rule Set.
9193

9294
Custom rules are always applied before rules in the Default Rule Set are evaluated. If a request matches a custom rule, the corresponding rule action is applied. The request is either blocked or passed through to the back-end. No other custom rules or the rules in the Default Rule Set are processed. You can also remove the Default Rule Set from your WAF policies.
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: Web application firewall exclusion lists in Azure Front Door - Azure portal
3+
description: This article provides information on exclusion lists configuration in Azure Front with the Azure portal.
4+
services: web-application-firewall
5+
author: vhorne
6+
ms.service: web-application-firewall
7+
ms.date: 02/25/2020
8+
ms.author: victorh
9+
ms.topic: conceptual
10+
---
11+
12+
# Web Application Firewall (WAF) with Front Door Service exclusion lists
13+
14+
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. For example, Active Directory inserts tokens that are used for authentication. These tokens can contain special characters that may trigger a false positive from the WAF rules. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. An exclusion list can be configured using [PowserShell](https://docs.microsoft.com/powershell/module/az.frontdoor/New-AzFrontDoorWafManagedRuleExclusionObject?view=azps-3.5.0), [Azure CLI](https://docs.microsoft.com/cli/azure/ext/front-door/network/front-door/waf-policy/managed-rules/exclusion?view=azure-cli-latest#ext-front-door-az-network-front-door-waf-policy-managed-rules-exclusion-add), [Rest API](https://docs.microsoft.com/rest/api/frontdoorservice/webapplicationfirewall/policies/createorupdate), or the Azure portal. The following example shows the Azure portal configuration.
15+
## Configure exclusion lists using the Azure portal
16+
**Manage exclusions** is accessible from WAF portal under **Managed rules**
17+
18+
![Manage exclusion](../media/waf-front-door-exclusion/exclusion1.png)
19+
![Manage exclusion_add](../media/waf-front-door-exclusion/exclusion2.png)
20+
21+
An example exclusion list:
22+
![Manage exclusion_define](../media/waf-front-door-exclusion/exclusion3.png)
23+
24+
This example excludes the value in the *user* header field. A valid request may include the *user* field that contains a string that triggers a SQL injection rule. You can exclude the *user* parameter in this case so that the WAF rule doesn't evaluate anything in the field.
25+
26+
The following attributes can be added to exclusion lists by name. The values of the fields you use aren't evaluated against WAF rules, but their names are evaluated. The exclusion lists remove inspection of the field's value.
27+
28+
* Request header name
29+
* Request cookie name
30+
* Query string args name
31+
* Request body post args name
32+
33+
You can specify an exact request header, body, cookie, or query string attribute match. Or, you can optionally specify partial matches. The following operators are the supported match criteria:
34+
35+
- **Equals**: This operator is used for an exact match. For example, to select a header named **bearerToken**, use the equals operator with the selector set as **bearerToken**.
36+
- **Starts with**: This operator matches all fields that start with the specified selector value.
37+
- **Ends with**: This operator matches all request fields that end with the specified selector value.
38+
- **Contains**: This operator matches all request fields that contain the specified selector value.
39+
- **Equals any**: This operator matches all request fields. * is the selector value.
40+
41+
Header and cookie names are case insensitive.
42+
43+
You can apply exclusion list to all rules within the managed rule set, to rules for a specific rule group, or to a single rule as shown in the previous example.
44+
45+
## Next steps
46+
47+
After you configure your WAF settings, learn how to view your WAF logs. For more information, see [Front Door diagnostics](../afds/waf-front-door-monitor.md).
96.3 KB
Loading
23.2 KB
Loading
24.1 KB
Loading

articles/web-application-firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,8 @@
5050
items:
5151
- name: Custom rules
5252
href: ./afds/waf-front-door-custom-rules.md
53+
- name: Exclusion lists
54+
href: ./afds/waf-front-door-exclusion.md
5355
- name: Policy settings
5456
href: ./afds/waf-front-door-policy-settings.md
5557
- name: Geo-filtering

0 commit comments

Comments
 (0)