Skip to content

Commit ede48e3

Browse files
authored
Merge pull request #285509 from vhorne/waf-bm1.1
Updates for bot manager 1.1
2 parents 57cd3dc + 566725b commit ede48e3

File tree

6 files changed

+71
-19
lines changed

6 files changed

+71
-19
lines changed

articles/web-application-firewall/ag/ag-overview.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -111,18 +111,22 @@ Three bot categories are supported:
111111

112112
- **Bad**
113113

114-
Bad bots include bots from malicious IP addresses and bots that falsify their identities. Bad bots with malicious IPs are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise.
114+
Bad bots are bots with malicious IP addresses and bots that have falsified their identities. Bad bots includes malicious IP addresses that are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise and IP reputation feeds. Bad bots also include bots that identify themselves as good bots but their IP addresses don’t belong to legitimate bot publishers.
115115
- **Good**
116116

117-
Good bots include validated search engines such as Googlebot, bingbot, and other trusted user agents.
117+
Good Bots are trusted user agents. Good bot rules are categorized into multiple categories to provide granular control over WAF policy configuration. These categories include:
118+
- verified search engine bots (such as Googlebot and Bingbot)
119+
- validated link checker bots
120+
- verified social media bots (such as Facebookbot and LinkedInBot)
121+
- verified advertising bots
122+
- verified content checker bots
123+
- validated miscellaneous bots
118124

119125
- **Unknown**
120126

121-
Unknown bots are classified via published user agents without more validation. For example, market analyzer, feed fetchers, and data collection agents. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
127+
Unknown bots are user agents without additional validation. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
122128

123-
The WAF platform actively manages and dynamically updates bot signatures.
124-
125-
:::image type="content" source="../media/ag-overview/bot-rule-set.png" alt-text="Screenshot of bot rule set.":::
129+
The WAF platform actively manages and dynamically updates the bot signatures.
126130

127131
You can assign Microsoft_BotManagerRuleSet_1.0 by using the **Assign** option under **Managed Rulesets**:
128132

@@ -132,6 +136,7 @@ When Bot protection is enabled, it blocks, allows, or logs incoming requests tha
132136

133137
You can access WAF logs from a storage account, event hub, log analytics, or send logs to a partner solution.
134138

139+
For more information about Application Gateway bot protection, see [Azure Web Application Firewall on Azure Application Gateway bot protection overview](bot-protection-overview.md).
135140

136141
### WAF modes
137142

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 59 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -224,15 +224,25 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
224224
|**[crs_42_tight_security](#crs42)**|Protect against path-traversal attacks|
225225
|**[crs_45_trojans](#crs45)**|Protect against backdoor trojans|
226226

227-
### Bot rules
227+
### Bot Manager 1.0
228228

229-
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
229+
The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots.
230230

231-
|Rule group name|Description|
231+
|Rule group|Description|
232232
|---|---|
233-
|**[BadBots](#bot100)**|Protect against bad bots|
234-
|**[GoodBots](#bot200)**|Identify good bots|
235-
|**[UnknownBots](#bot300)**|Identify unknown bots|
233+
|[BadBots](#bot100)|Protect against bad bots|
234+
|[GoodBots](#bot200)|Identify good bots|
235+
|[UnknownBots](#bot300)|Identify unknown bots|
236+
237+
### Bot Manager 1.1
238+
239+
The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection.
240+
241+
|Rule group|Description|
242+
|---|---|
243+
|[BadBots](#bot11-100)|Protect against bad bots|
244+
|[GoodBots](#bot11-200)|Identify good bots|
245+
|[UnknownBots](#bot11-300)|Identify unknown bots|
236246

237247
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
238248

@@ -1483,18 +1493,18 @@ The following rule groups and rules are available when using Web Application Fir
14831493
|950921|Backdoor access|
14841494
|950922|Backdoor access|
14851495

1486-
# [Bot rules](#tab/bot)
1496+
# [Bot Manager 1.0](#tab/bot)
14871497

1488-
## <a name="bot"></a> Bot Manager rule sets
1498+
## <a name="bot"></a> 1.0 rule sets
14891499

14901500
### <a name="bot100"></a> Bad bots
14911501
|RuleId|Description|
14921502
|---|---|
14931503
|Bot100100|Malicious bots detected by threat intelligence|
14941504
|Bot100200|Malicious bots that have falsified their identity|
1495-
1496-
Bot100100 scans both client IP addresses and the IPs in the X-Forwarded-For header.
14971505

1506+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1507+
14981508
### <a name="bot200"></a> Good bots
14991509
|RuleId|Description|
15001510
|---|---|
@@ -1506,13 +1516,50 @@ The following rule groups and rules are available when using Web Application Fir
15061516
|---|---|
15071517
|Bot300100|Unspecified identity|
15081518
|Bot300200|Tools and frameworks for web crawling and attacks|
1509-
|Bot300300|General purpose HTTP clients and SDKs|
1519+
|Bot300300|General-purpose HTTP clients and SDKs|
15101520
|Bot300400|Service agents|
15111521
|Bot300500|Site health monitoring services|
15121522
|Bot300600|Unknown bots detected by threat intelligence|
15131523
|Bot300700|Other bots|
15141524

1515-
Bot300600 scans both client IP addresses and the IPs in the X-Forwarded-For header.
1525+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1526+
1527+
# [Bot Manager 1.1](#tab/bot11)
1528+
1529+
## <a name="bot11"></a> 1.1 rule sets
1530+
1531+
### <a name="bot11-100"></a> Bad bots
1532+
|RuleId|Description|
1533+
|---|---|
1534+
|Bot100100|Malicious bots detected by threat intelligence|
1535+
|Bot100200|Malicious bots that have falsified their identity|
1536+
|Bot100300|High risk bots detected by threat intelligence|
1537+
1538+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1539+
1540+
### <a name="bot11-200"></a> Good bots
1541+
|RuleId|Description|
1542+
|---|---|
1543+
|Bot200100|Search engine crawlers|
1544+
|Bot200200|Verified miscellaneous bots|
1545+
|Bot200300|Verified link checker bots|
1546+
|Bot200400|Verified social media bots|
1547+
|Bot200500|Verified content fetchers|
1548+
|Bot200600|Verified feed fetchers|
1549+
|Bot200700|Verified advertising bots|
1550+
1551+
### <a name="bot11-300"></a> Unknown bots
1552+
|RuleId|Description|
1553+
|---|---|
1554+
|Bot300100|Unspecified identity|
1555+
|Bot300200|Tools and frameworks for web crawling and attacks|
1556+
|Bot300300|General-purpose HTTP clients and SDKs|
1557+
|Bot300400|Service agents|
1558+
|Bot300500|Site health monitoring services|
1559+
|Bot300600|Unknown bots detected by threat intelligence. This rule also includes IP addresses matched to the Tor network.|
1560+
|Bot300700|Other bots|
1561+
1562+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
15161563

15171564
---
15181565

articles/web-application-firewall/ag/bot-protection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ You can enable a managed bot protection rule set for your WAF to block or log re
1818

1919
## Use with OWASP rulesets
2020

21-
You can use the Bot Protection ruleset alongside any of the OWASP rulesets with the Application Gateway WAF v2 SKU. Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains another rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_1.0**, and you can enable or disable it like the other OWASP rules.
21+
You can use the Bot Protection ruleset alongside any of the OWASP rulesets with the Application Gateway WAF v2 SKU. Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains another rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_1.1**, and you can enable or disable it like the other OWASP rules.
2222

2323
:::image type="content" source="../media/bot-protection-overview/bot-ruleset.png" alt-text="Screenshot show bot protection ruleset." lightbox="../media/bot-protection-overview/bot-ruleset.png":::
2424

Binary file not shown.
-17.3 KB
Loading
49.8 KB
Loading

0 commit comments

Comments
 (0)