Skip to content

Commit fc81358

Browse files
authored
Merge pull request #78958 from winthrop28/patch-9
removing mention of "preview"
2 parents 96659b2 + b46a053 commit fc81358

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

articles/application-gateway/custom-waf-rules-overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,6 @@ ms.author: victorh
1111

1212
# Custom rules for Web Application Firewall
1313

14-
> [!IMPORTANT]
15-
> Azure Application Gateway WAF custom rules is currently a public preview. **Custom rules are available only for the WAF_v2 SKU**.
16-
> This public preview is provided without a service-level agreement and shouldn't be used for production workloads. Certain features might not be supported, might have constrained capabilities, or might not be available in all Azure locations. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
17-
1814
The Azure Application Gateway web application firewall (WAF) comes with a pre-configured, platform-managed ruleset that offers protection from many different types of attacks. These attacks include cross site scripting, SQL injection, and others. If you're a WAF admin, you may want to write you own rules to augment the core rule set (CRS) rules. Your rules can either block or allow requested traffic based on matching criteria.
1915

2016
Custom rules allow you to create your own rules that are evaluated for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. The custom rules contain a rule name, rule priority, and an array of matching conditions. If these conditions are met, an action is taken (to allow or block).

0 commit comments

Comments
 (0)