|
| 1 | +--- |
| 2 | +title: Web application firewall exclusion lists in Azure Front Door - Azure portal |
| 3 | +description: This article provides information on exclusion lists configuration in Azure Front with the Azure portal. |
| 4 | +services: web-application-firewall |
| 5 | +author: vhorne |
| 6 | +ms.service: web-application-firewall |
| 7 | +ms.date: 02/25/2020 |
| 8 | +ms.author: victorh |
| 9 | +ms.topic: conceptual |
| 10 | +--- |
| 11 | + |
| 12 | +# Web Application Firewall (WAF) with Front Door Service exclusion lists |
| 13 | + |
| 14 | +Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. For example, Active Directory inserts tokens that are used for authentication. These tokens can contain special characters that may trigger a false positive from the WAF rules. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. An exclusion list can be configured using [PowserShell](https://docs.microsoft.com/powershell/module/az.frontdoor/New-AzFrontDoorWafManagedRuleExclusionObject?view=azps-3.5.0), [Azure CLI](https://docs.microsoft.com/cli/azure/ext/front-door/network/front-door/waf-policy/managed-rules/exclusion?view=azure-cli-latest#ext-front-door-az-network-front-door-waf-policy-managed-rules-exclusion-add), [Rest API](https://docs.microsoft.com/rest/api/frontdoorservice/webapplicationfirewall/policies/createorupdate), or the Azure portal. The following example shows the Azure portal configuration. |
| 15 | +## Configure exclusion lists using the Azure portal |
| 16 | +**Manage exclusions** is accessible from WAF portal under **Managed rules** |
| 17 | + |
| 18 | + |
| 19 | + |
| 20 | + |
| 21 | + An example exclusion list: |
| 22 | + |
| 23 | + |
| 24 | +This example excludes the value in the *user* header field. A valid request may include the *user* field that contains a string that triggers a SQL injection rule. You can exclude the *user* parameter in this case so that the WAF rule doesn't evaluate anything in the field. |
| 25 | + |
| 26 | +The following attributes can be added to exclusion lists by name. The values of the fields you use aren't evaluated against WAF rules, but their names are evaluated. The exclusion lists remove inspection of the field's value. |
| 27 | + |
| 28 | +* Request header name |
| 29 | +* Request cookie name |
| 30 | +* Query string args name |
| 31 | +* Request body post args name |
| 32 | + |
| 33 | +You can specify an exact request header, body, cookie, or query string attribute match. Or, you can optionally specify partial matches. The following operators are the supported match criteria: |
| 34 | + |
| 35 | +- **Equals**: This operator is used for an exact match. For example, to select a header named **bearerToken**, use the equals operator with the selector set as **bearerToken**. |
| 36 | +- **Starts with**: This operator matches all fields that start with the specified selector value. |
| 37 | +- **Ends with**: This operator matches all request fields that end with the specified selector value. |
| 38 | +- **Contains**: This operator matches all request fields that contain the specified selector value. |
| 39 | +- **Equals any**: This operator matches all request fields. * is the selector value. |
| 40 | + |
| 41 | +Header and cookie names are case insensitive. |
| 42 | + |
| 43 | +You can apply exclusion list to all rules within the managed rule set, to rules for a specific rule group, or to a single rule as shown in the previous example. |
| 44 | + |
| 45 | +## Next steps |
| 46 | + |
| 47 | +After you configure your WAF settings, learn how to view your WAF logs. For more information, see [Front Door diagnostics](../afds/waf-front-door-monitor.md). |
0 commit comments