You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure-networking/introduction-azure-web-application-firewall/5-knowledge-check.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -40,10 +40,10 @@ quiz:
40
40
choices:
41
41
- content: "Your web app includes user accounts and stores sensitive or proprietary data."
42
42
isCorrect: false
43
-
explanation: "Incorrect. User credentials, sensitive personal information, and proprietary company data are coveted by malicious users. Azure Web Application Firewall is a good choice for protecting that data."
43
+
explanation: "Incorrect. Malicious users covet user credentials, sensitive personal information, and proprietary company data. Azure Web Application Firewall is a good choice for protecting that data."
44
44
- content: "Your web app is made available to employees, customers, and vendors using a private network connection."
45
45
isCorrect: true
46
-
explanation: "Correct. Private access to the virtual network where the web app resides means that app traffic never goes over the public internet. There is no need to protect the app against common web exploits."
46
+
explanation: "Correct. Private access to the virtual network where the web app resides means that app traffic never goes over the public internet. There's no need to protect the app against common web exploits."
47
47
- content: "Your web app development team lacks security expertise, time, and money."
48
48
isCorrect: false
49
49
explanation: "Incorrect. A lack of expertise, time, and money can prevent your team from covering all possible exploits, which can leave your app vulnerable. Azure Web Application Firewall protects against all OWASP exploits and can be deployed quickly and cost-effectively."
Copy file name to clipboardExpand all lines: learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/1-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
Azure Web Application Firewall is an Azure service that protects web applications from common attacks such as SQL injection and cross-site scripting. The protection extends beyond OWASP (Open Worldwide Application Security Project) top 10 attacks. It can also detect malicious bot attacks, API attacks, and application layer DDoS attacks.
1
+
Azure Web Application Firewall is an Azure service that protects web applications from common attacks such as SQL injection and cross-site scripting. The protection extends beyond OWASP (Open Worldwide Application Security Project) top 10 attacks. It can also detect malicious bot attacks, API attacks, and application layer DDoS attacks.
2
2
3
3
Suppose you work for Contoso, Ltd., a financial-services company in Seattle with major offices located throughout the world. Contoso's compute environment runs as Azure virtual network resources. These resources include several existing and planned web applications that serve customers, vendors, and employees.
Copy file name to clipboardExpand all lines: learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/2-what-is-azure-web-application-firewall.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ You can deploy Azure Web Application Firewall in minutes. Your web apps immediat
26
26
27
27
To help you evaluate Azure Web Application Firewall, here are some of its important features:
28
28
29
-
-**Managed rules**: The rules that Azure Web Application Firewall uses to detect and prevent common exploits are created, maintained, and updated by Microsoft's security team. If a rule changes, or a rule set (refer to the following description) is modified, Microsoft updates Azure Web Application Firewall automatically and seamlessly.
29
+
-**Managed rules**: Microsoft's security team creates, maintains, and updates the rules that Azure Web Application Firewall uses to detect and prevent common exploits. If a rule changes, or a rule set (refer to the following description) is modified, Microsoft updates Azure Web Application Firewall automatically and seamlessly.
30
30
31
31
> [!NOTE]
32
32
> You can't modify or delete the managed rules offered by Azure Web Application Firewall. However, if a particular rule is problematic for your environment (for example, it blocks legitimate traffic to your web app) you can create exclusions or disable the rule or rule set. You can also create custom rules to overwrite the default behavior.
Copy file name to clipboardExpand all lines: learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/3-how-azure-web-application-firewall-works.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Azure Web Application Firewall thwarts known exploits by applying rules to an ap
15
15
16
16
The rules that Azure Web Application Firewall uses to detect and block common vulnerabilities are mostly managed rules that belong to various rule groups. Each rule group is a collection of rules and a managed rule set is collection of rule groups. Managed rule sets include Microsoft Threat Intelligence based rule groups, CVE (Common Vulnerabilities and Exposures) rule groups, and core rule groups (CRS).
17
17
18
-
The CRS rules are defined by the Open Web Application Security Project (OWASP). Microsoft's team of security experts codes, maintains, and updates managed rules. The rules are modified or added to as needed. When a managed rule changes, Microsoft updates Azure Web Application Firewall automatically and without app downtime.
18
+
Open Web Application Security Project (OWASP) defines the CRS rules. Microsoft's team of security experts codes, maintains, and updates managed rules. The rules are modified or added to as needed. When a managed rule changes, Microsoft updates Azure Web Application Firewall automatically and without app downtime.
19
19
20
20
The following screenshot shows some of the rules and rule groups in Microsoft Default Rule set 2.1 (DRS2.1). This should give you a sense of the depth of protection offered by Azure Web Application Firewall.
21
21
@@ -57,7 +57,7 @@ By default, your web application is accessible from the Internet. However, somet
57
57
58
58
Azure Web Application Firewall custom rules support rate limiting to control access based on matching conditions and the rates of incoming requests.
59
59
60
-
This custom rule enables you to detect abnormally high levels of traffic and block some types of application layer denial of service attacks. Rate limiting also protects you against clients that have accidentally been misconfigured to send large volumes of requests in a short time period. The custom rule is defined by the rate limit counting duration (either one minute or five-minute intervals) and the rate limit threshold (the maximum number of requests allowed in the rate limit duration).
60
+
This custom rule enables you to detect abnormally high levels of traffic and block some types of application layer denial of service attacks. Rate limiting also protects you against clients that have accidentally been misconfigured to send large volumes of requests in a short time period. Rate limit counting duration (either one minute or five-minute intervals) defines the custom rule and the rate limit threshold (the maximum number of requests allowed in the rate limit duration).
61
61
62
62
## Detection mode vs prevention mode
63
63
@@ -75,7 +75,7 @@ Once the app is ready to be deployed, you switch to prevention mode.
75
75
76
76
## Using Microsoft Sentinel with Azure WAF
77
77
78
-
Azure WAF combined with Microsoft Sentinel can provide security information event management for WAF resources. Using Microsoft Sentinel, you can access the WAF data connector to Sentinel using Log Analytics. The WAF workbooks show analytics for WAF on Azure Front Door and WAF on Application Gateway. The WAF analytic rules detect SQLi and XSS attacks from AFD and Application Gateway logs. The WAF Notebook allows investigation of SQL injection incidents on Azure Front Door.
78
+
Azure WAF combined with Microsoft Sentinel can provide security information event management for WAF resources. Using Microsoft Sentinel, you can access the WAF data connector to Sentinel using Log Analytics. The WAF workbooks show analytics for WAF on Azure Front Door and WAF on Application Gateway. The WAF analytic rules detect SQL and XSS attacks from AFD and Application Gateway logs. The WAF Notebook allows investigation of SQL injection incidents on Azure Front Door.
Copy file name to clipboardExpand all lines: learn-pr/azure-networking/introduction-azure-web-application-firewall/includes/4-when-to-use-azure-web-application-firewall.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ As part of your Azure Web Application Firewall evaluation, you know that Contoso
13
13
14
14
## You have web apps that contain sensitive or proprietary data
15
15
16
-
Some web attackers are motivated only by the challenge of breaking into a system. However, most malicious hackers use injection, protocol attacks, and similar exploits with payoff in mind. That payoff might be any of the following items:
16
+
The challenge of breaking into a system is some web attackers only motivation. However, most malicious hackers use injection, protocol attacks, and similar exploits with payoff in mind. That payoff might be any of the following items:
17
17
18
18
- Customer credit card numbers
19
19
- Sensitive personal information, such as driver's license numbers or passport numbers
@@ -49,7 +49,7 @@ Coding against the full range of potential web app exploits requires significant
49
49
- Front-end web technologies, such as HTML, CSS, and JavaScript
50
50
- Server-side web technologies, such as SQL, PHP, and user sessions
51
51
52
-
What if your company's web-development team lacks knowledge in one or more of these concepts? In that case, your web apps are vulnerable to multiple exploits. By contrast, Azure Web Application Firewall is maintained and updated by a team of Microsoft security experts.
52
+
What if your company's web-development team lacks knowledge in one or more of these concepts? In that case, your web apps are vulnerable to multiple exploits. By contrast, a team of Microsoft security experts maintain and update Azure Web Application Firewall.
0 commit comments