Skip to content

Commit d7a60fa

Browse files
committed
Update list structure in troubleshoot false negatives
1 parent 0cea5d9 commit d7a60fa

File tree

1 file changed

+17
-10
lines changed

1 file changed

+17
-10
lines changed

src/content/docs/waf/managed-rules/troubleshooting.mdx

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,20 +39,27 @@ If you contact Cloudflare Support to verify whether a WAF managed rule triggers
3939

4040
To identify false negatives, review the HTTP logs on your origin server. To reduce false negatives, use the following checklist:
4141

42-
- Are DNS records that serve HTTP traffic [proxied through Cloudflare](/dns/proxy-status/)?
42+
- Are DNS records that serve HTTP traffic [proxied through Cloudflare](/dns/proxy-status/)?<br/>
43+
Cloudflare only mitigates requests in proxied traffic.
4344

44-
- Have you deployed any of the [WAF managed rulesets](/waf/managed-rules/#available-managed-rulesets) in your zone?
45-
- Old dashboard: Go to **Security** > **WAF** > **Managed rules** tab.
46-
- New security dashboard: Go to **Security** > **Security rules** and filter by **Managed rules**.
45+
- Have you deployed any of the [WAF managed rulesets](/waf/managed-rules/#available-managed-rulesets) in your zone?<br/>
46+
You must [deploy a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#deploy-a-managed-ruleset) to apply its rules.
4747

48-
- Are Managed Rules being skipped via an [exception](/waf/managed-rules/waf-exceptions/)?
48+
- Are Managed Rules being skipped via an [exception](/waf/managed-rules/waf-exceptions/)?<br/>
49+
Use [Security Events](/waf/analytics/security-events/) to search for requests being skipped. If necessary, adjust the exception expression so that it matches the attack traffic that should have been blocked.
4950

50-
- Not all rules of WAF managed rulesets are enabled by default, so you should review individual managed rules.
51+
- Have you enabled any necessary managed rules that are not enabled by default?<br/>
52+
Not all rules of WAF managed rulesets are enabled by default, so you should review individual managed rules.
5153
- For example, Cloudflare allows requests with empty user agents by default. To block requests with an empty user agent, enable the rule with ID <RuleID id="b57df4f17f7f4ea4b8db33e20a6dbbd3"/> in the Cloudflare Managed Ruleset.
52-
- Another example: If you are looking to block unmitigated SQL injection (SQLi) attacks, make sure the relevant managed rules tagged with `sqli` are enabled in the Cloudflare Managed Ruleset.
54+
- Another example: If you want to block unmitigated SQL injection (SQLi) attacks, make sure the relevant managed rules tagged with `sqli` are enabled in the Cloudflare Managed Ruleset.
5355

54-
- Is the attack traffic matching a custom rule [skipping all Managed Rules](/waf/custom-rules/skip/)?
56+
For instructions, refer to [Configure rules in bulk in a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#configure-rules-in-bulk-in-a-managed-ruleset).
5557

56-
- Is the attack traffic matching an allowed ASN, IP range, or IP address in [IP Access rules](/waf/tools/ip-access-rules/)?
58+
- Is the attack traffic matching a custom rule [skipping all Managed Rules](/waf/custom-rules/skip/)?<br/>
59+
If necessary, adjust the custom rule expression so that it does not apply to the attack traffic.
5760

58-
- Is the malicious traffic reaching your origin IP addresses directly, therefore bypassing Cloudflare protection? Block all traffic except from [Cloudflare's IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/) at your origin server.
61+
- Is the attack traffic matching an allowed ASN, IP range, or IP address in [IP Access rules](/waf/tools/ip-access-rules/)?<br/>
62+
Review your IP Access rules and make sure that any allow rules do not match the attack traffic.
63+
64+
- Is the malicious traffic reaching your origin IP addresses directly, therefore bypassing Cloudflare protection?<br/>
65+
Block all traffic except from [Cloudflare's IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/) at your origin server.

0 commit comments

Comments
 (0)