Skip to content

Commit 3aa09b7

Browse files
committed
Line edits2
1 parent b1be79b commit 3aa09b7

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

learn-pr/azure-networking/introduction-azure-web-application-firewall/5-knowledge-check.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ quiz:
4040
choices:
4141
- content: "Your web app includes user accounts and stores sensitive or proprietary data."
4242
isCorrect: false
43-
explanation: "Incorrect. User credentials, sensitive personal information, and proprietary company data are coveted by malicious users. Azure Web Application Firewall is a good choice for protecting that data."
43+
explanation: "Incorrect. Malicious users covet user credentials, sensitive personal information, and proprietary company data. Azure Web Application Firewall is a good choice for protecting that data."
4444
- content: "Your web app is made available to employees, customers, and vendors using a private network connection."
4545
isCorrect: true
46-
explanation: "Correct. Private access to the virtual network where the web app resides means that app traffic never goes over the public internet. There is no need to protect the app against common web exploits."
46+
explanation: "Correct. Private access to the virtual network where the web app resides means that app traffic never goes over the public internet. There's no need to protect the app against common web exploits."
4747
- content: "Your web app development team lacks security expertise, time, and money."
4848
isCorrect: false
4949
explanation: "Incorrect. A lack of expertise, time, and money can prevent your team from covering all possible exploits, which can leave your app vulnerable. Azure Web Application Firewall protects against all OWASP exploits and can be deployed quickly and cost-effectively."

learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Azure Web Application Firewall is an Azure service that protects web applications from common attacks such as SQL injection and cross-site scripting. The protection extends beyond OWASP (Open Worldwide Application Security Project) top 10 attacks. It can also detect malicious bot attacks, API attacks, and application layer DDoS attacks.
1+
Azure Web Application Firewall is an Azure service that protects web applications from common attacks such as SQL injection and cross-site scripting. The protection extends beyond OWASP (Open Worldwide Application Security Project) top 10 attacks. It can also detect malicious bot attacks, API attacks, and application layer DDoS attacks.
22

33
Suppose you work for Contoso, Ltd., a financial-services company in Seattle with major offices located throughout the world. Contoso's compute environment runs as Azure virtual network resources. These resources include several existing and planned web applications that serve customers, vendors, and employees.
44

learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/2-what-is-azure-web-application-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ You can deploy Azure Web Application Firewall in minutes. Your web apps immediat
2626

2727
To help you evaluate Azure Web Application Firewall, here are some of its important features:
2828

29-
- **Managed rules**: The rules that Azure Web Application Firewall uses to detect and prevent common exploits are created, maintained, and updated by Microsoft's security team. If a rule changes, or a rule set (refer to the following description) is modified, Microsoft updates Azure Web Application Firewall automatically and seamlessly.
29+
- **Managed rules**: Microsoft's security team creates, maintains, and updates the rules that Azure Web Application Firewall uses to detect and prevent common exploits. If a rule changes, or a rule set (refer to the following description) is modified, Microsoft updates Azure Web Application Firewall automatically and seamlessly.
3030

3131
> [!NOTE]
3232
> You can't modify or delete the managed rules offered by Azure Web Application Firewall. However, if a particular rule is problematic for your environment (for example, it blocks legitimate traffic to your web app) you can create exclusions or disable the rule or rule set. You can also create custom rules to overwrite the default behavior.

learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/3-how-azure-web-application-firewall-works.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Azure Web Application Firewall thwarts known exploits by applying rules to an ap
1515

1616
The rules that Azure Web Application Firewall uses to detect and block common vulnerabilities are mostly managed rules that belong to various rule groups. Each rule group is a collection of rules and a managed rule set is collection of rule groups. Managed rule sets include Microsoft Threat Intelligence based rule groups, CVE (Common Vulnerabilities and Exposures) rule groups, and core rule groups (CRS).
1717

18-
The CRS rules are defined by the Open Web Application Security Project (OWASP). Microsoft's team of security experts codes, maintains, and updates managed rules. The rules are modified or added to as needed. When a managed rule changes, Microsoft updates Azure Web Application Firewall automatically and without app downtime.
18+
Open Web Application Security Project (OWASP) defines the CRS rules. Microsoft's team of security experts codes, maintains, and updates managed rules. The rules are modified or added to as needed. When a managed rule changes, Microsoft updates Azure Web Application Firewall automatically and without app downtime.
1919

2020
The following screenshot shows some of the rules and rule groups in Microsoft Default Rule set 2.1 (DRS2.1). This should give you a sense of the depth of protection offered by Azure Web Application Firewall.
2121

@@ -57,7 +57,7 @@ By default, your web application is accessible from the Internet. However, somet
5757

5858
Azure Web Application Firewall custom rules support rate limiting to control access based on matching conditions and the rates of incoming requests.
5959

60-
This custom rule enables you to detect abnormally high levels of traffic and block some types of application layer denial of service attacks. Rate limiting also protects you against clients that have accidentally been misconfigured to send large volumes of requests in a short time period. The custom rule is defined by the rate limit counting duration (either one minute or five-minute intervals) and the rate limit threshold (the maximum number of requests allowed in the rate limit duration).
60+
This custom rule enables you to detect abnormally high levels of traffic and block some types of application layer denial of service attacks. Rate limiting also protects you against clients that have accidentally been misconfigured to send large volumes of requests in a short time period. Rate limit counting duration (either one minute or five-minute intervals) defines the custom rule and the rate limit threshold (the maximum number of requests allowed in the rate limit duration).
6161

6262
## Detection mode vs prevention mode
6363

@@ -75,7 +75,7 @@ Once the app is ready to be deployed, you switch to prevention mode.
7575

7676
## Using Microsoft Sentinel with Azure WAF
7777

78-
Azure WAF combined with Microsoft Sentinel can provide security information event management for WAF resources. Using Microsoft Sentinel, you can access the WAF data connector to Sentinel using Log Analytics. The WAF workbooks show analytics for WAF on Azure Front Door and WAF on Application Gateway. The WAF analytic rules detect SQLi and XSS attacks from AFD and Application Gateway logs. The WAF Notebook allows investigation of SQL injection incidents on Azure Front Door.
78+
Azure WAF combined with Microsoft Sentinel can provide security information event management for WAF resources. Using Microsoft Sentinel, you can access the WAF data connector to Sentinel using Log Analytics. The WAF workbooks show analytics for WAF on Azure Front Door and WAF on Application Gateway. The WAF analytic rules detect SQL and XSS attacks from AFD and Application Gateway logs. The WAF Notebook allows investigation of SQL injection incidents on Azure Front Door.
7979

8080
:::image type="content" source="../media/3-waf-sentinel-1.png" alt-text="Screenshot showing Sentinel WAF settings.":::
8181

learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/4-when-to-use-azure-web-application-firewall.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ As part of your Azure Web Application Firewall evaluation, you know that Contoso
1313

1414
## You have web apps that contain sensitive or proprietary data
1515

16-
Some web attackers are motivated only by the challenge of breaking into a system. However, most malicious hackers use injection, protocol attacks, and similar exploits with payoff in mind. That payoff might be any of the following items:
16+
The challenge of breaking into a system is some web attackers only motivation. However, most malicious hackers use injection, protocol attacks, and similar exploits with payoff in mind. That payoff might be any of the following items:
1717

1818
- Customer credit card numbers
1919
- Sensitive personal information, such as driver's license numbers or passport numbers
@@ -49,7 +49,7 @@ Coding against the full range of potential web app exploits requires significant
4949
- Front-end web technologies, such as HTML, CSS, and JavaScript
5050
- Server-side web technologies, such as SQL, PHP, and user sessions
5151

52-
What if your company's web-development team lacks knowledge in one or more of these concepts? In that case, your web apps are vulnerable to multiple exploits. By contrast, Azure Web Application Firewall is maintained and updated by a team of Microsoft security experts.
52+
What if your company's web-development team lacks knowledge in one or more of these concepts? In that case, your web apps are vulnerable to multiple exploits. By contrast, a team of Microsoft security experts maintain and update Azure Web Application Firewall.
5353

5454
## Your web-app developers have other priorities
5555

0 commit comments

Comments
 (0)