You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/ag-overview.md
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,18 +111,22 @@ Three bot categories are supported:
111
111
112
112
-**Bad**
113
113
114
-
Bad bots include bots from malicious IP addresses and bots that falsify their identities. Bad bots with malicious IPs are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise.
114
+
Bad bots are bots with malicious IP addresses and bots that have falsified their identities. Bad bots includes malicious IP addresses that are sourced from the Microsoft Threat Intelligence feed’s high confidence IP Indicators of Compromise and IP reputation feeds. Bad bots also include bots that identify themselves as good bots but their IP addresses don’t belong to legitimate bot publishers.
115
115
-**Good**
116
116
117
-
Good bots include validated search engines such as Googlebot, bingbot, and other trusted user agents.
117
+
Good Bots are trusted user agents. Good bot rules are categorized into multiple categories to provide granular control over WAF policy configuration. These categories include:
118
+
- verified search engine bots (such as Googlebot and Bingbot)
119
+
- validated link checker bots
120
+
- verified social media bots (such as Facebookbot and LinkedInBot)
121
+
- verified advertising bots
122
+
- verified content checker bots
123
+
- validated miscellaneous bots
118
124
119
125
-**Unknown**
120
126
121
-
Unknown bots are classified via published user agents without more validation. For example, market analyzer, feed fetchers, and data collection agents. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
127
+
Unknown bots are user agents without additional validation. Unknown bots also include malicious IP addresses that are sourced from Microsoft Threat Intelligence feed’s medium confidence IP Indicators of Compromise.
122
128
123
-
The WAF platform actively manages and dynamically updates bot signatures.
124
-
125
-
:::image type="content" source="../media/ag-overview/bot-rule-set.png" alt-text="Screenshot of bot rule set.":::
129
+
The WAF platform actively manages and dynamically updates the bot signatures.
126
130
127
131
You can assign Microsoft_BotManagerRuleSet_1.0 by using the **Assign** option under **Managed Rulesets**:
128
132
@@ -132,6 +136,7 @@ When Bot protection is enabled, it blocks, allows, or logs incoming requests tha
132
136
133
137
You can access WAF logs from a storage account, event hub, log analytics, or send logs to a partner solution.
134
138
139
+
For more information about Application Gateway bot protection, see [Azure Web Application Firewall on Azure Application Gateway bot protection overview](bot-protection-overview.md).
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md
+59-12Lines changed: 59 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -224,15 +224,25 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
224
224
|**[crs_42_tight_security](#crs42)**|Protect against path-traversal attacks|
225
225
|**[crs_45_trojans](#crs45)**|Protect against backdoor trojans|
226
226
227
-
### Bot rules
227
+
### Bot Manager 1.0
228
228
229
-
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
229
+
The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots.
The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection.
240
+
241
+
|Rule group|Description|
242
+
|---|---|
243
+
|[BadBots](#bot11-100)|Protect against bad bots|
244
+
|[GoodBots](#bot11-200)|Identify good bots|
245
+
|[UnknownBots](#bot11-300)|Identify unknown bots|
236
246
237
247
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
238
248
@@ -1483,18 +1493,18 @@ The following rule groups and rules are available when using Web Application Fir
1483
1493
|950921|Backdoor access|
1484
1494
|950922|Backdoor access|
1485
1495
1486
-
# [Bot rules](#tab/bot)
1496
+
# [Bot Manager 1.0](#tab/bot)
1487
1497
1488
-
## <aname="bot"></a> Bot Manager rule sets
1498
+
## <aname="bot"></a> 1.0 rule sets
1489
1499
1490
1500
### <aname="bot100"></a> Bad bots
1491
1501
|RuleId|Description|
1492
1502
|---|---|
1493
1503
|Bot100100|Malicious bots detected by threat intelligence|
1494
1504
|Bot100200|Malicious bots that have falsified their identity|
1495
-
1496
-
Bot100100 scans both client IP addresses and the IPs in the X-Forwarded-For header.
1497
1505
1506
+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1507
+
1498
1508
### <aname="bot200"></a> Good bots
1499
1509
|RuleId|Description|
1500
1510
|---|---|
@@ -1506,13 +1516,50 @@ The following rule groups and rules are available when using Web Application Fir
1506
1516
|---|---|
1507
1517
|Bot300100|Unspecified identity|
1508
1518
|Bot300200|Tools and frameworks for web crawling and attacks|
1509
-
|Bot300300|Generalpurpose HTTP clients and SDKs|
1519
+
|Bot300300|General-purpose HTTP clients and SDKs|
1510
1520
|Bot300400|Service agents|
1511
1521
|Bot300500|Site health monitoring services|
1512
1522
|Bot300600|Unknown bots detected by threat intelligence|
1513
1523
|Bot300700|Other bots|
1514
1524
1515
-
Bot300600 scans both client IP addresses and the IPs in the X-Forwarded-For header.
1525
+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1526
+
1527
+
# [Bot Manager 1.1](#tab/bot11)
1528
+
1529
+
## <aname="bot11"></a> 1.1 rule sets
1530
+
1531
+
### <aname="bot11-100"></a> Bad bots
1532
+
|RuleId|Description|
1533
+
|---|---|
1534
+
|Bot100100|Malicious bots detected by threat intelligence|
1535
+
|Bot100200|Malicious bots that have falsified their identity|
1536
+
|Bot100300|High risk bots detected by threat intelligence|
1537
+
1538
+
Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
1539
+
1540
+
### <aname="bot11-200"></a> Good bots
1541
+
|RuleId|Description|
1542
+
|---|---|
1543
+
|Bot200100|Search engine crawlers|
1544
+
|Bot200200|Verified miscellaneous bots|
1545
+
|Bot200300|Verified link checker bots|
1546
+
|Bot200400|Verified social media bots|
1547
+
|Bot200500|Verified content fetchers|
1548
+
|Bot200600|Verified feed fetchers|
1549
+
|Bot200700|Verified advertising bots|
1550
+
1551
+
### <aname="bot11-300"></a> Unknown bots
1552
+
|RuleId|Description|
1553
+
|---|---|
1554
+
|Bot300100|Unspecified identity|
1555
+
|Bot300200|Tools and frameworks for web crawling and attacks|
1556
+
|Bot300300|General-purpose HTTP clients and SDKs|
1557
+
|Bot300400|Service agents|
1558
+
|Bot300500|Site health monitoring services|
1559
+
|Bot300600|Unknown bots detected by threat intelligence. This rule also includes IP addresses matched to the Tor network.|
1560
+
|Bot300700|Other bots|
1561
+
1562
+
Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/bot-protection-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ You can enable a managed bot protection rule set for your WAF to block or log re
18
18
19
19
## Use with OWASP rulesets
20
20
21
-
You can use the Bot Protection ruleset alongside any of the OWASP rulesets with the Application Gateway WAF v2 SKU. Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains another rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_1.0**, and you can enable or disable it like the other OWASP rules.
21
+
You can use the Bot Protection ruleset alongside any of the OWASP rulesets with the Application Gateway WAF v2 SKU. Only one OWASP ruleset can be used at any given time. The bot protection ruleset contains another rule that appears in its own ruleset. It's titled **Microsoft_BotManagerRuleSet_1.1**, and you can enable or disable it like the other OWASP rules.
22
22
23
23
:::image type="content" source="../media/bot-protection-overview/bot-ruleset.png" alt-text="Screenshot show bot protection ruleset." lightbox="../media/bot-protection-overview/bot-ruleset.png":::
0 commit comments