You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/afds/waf-faq.yml
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -52,9 +52,9 @@ sections:
52
52
When Azure Web Application Firewall is integrated with Azure Front Door, the WAF is a global resource. The same configuration applies across all Azure Front Door locations.
53
53
54
54
- question: |
55
-
How do I limit access to my back end to be from Azure Front Door only?
55
+
How do I make sure that only Azure Front Door can access the back end in my network?
56
56
answer: |
57
-
You can configure an IP access control list in your back end to allow for only Azure Front Door outbound IP address ranges by using an Azure Front Door service tag and deny any direct access from the internet. Service tags are supported for you to use on your virtual network. Additionally, you can verify that the `X-Forwarded-Host` HTTP header field is valid for your web application.
57
+
You can configure an IP access control list in your back end to allow for only Azure Front Door outbound IP address ranges by using an Azure Front Door service tag and deny any direct access from the internet. Service tags are supported for your virtual network. Additionally, you can verify that the `X-Forwarded-Host` HTTP header field is valid for your web application.
58
58
59
59
- question: |
60
60
Which WAF options should I choose?
@@ -69,10 +69,10 @@ sections:
69
69
1. Enable the WAF in [detection mode](./waf-front-door-create-portal.md#change-mode) to ensure that the WAF doesn't block requests while you're working through this process. We recommend this step for testing purposes on the WAF.
70
70
71
71
> [!IMPORTANT]
72
-
> This process describes how to enable the WAF on a new or existing solution when your priority is to minimize the disturbance to your application's users. If you're under attack or imminent threat, you might want to instead deploy the WAF in **Prevention** mode immediately. You can then use the tuning process to monitor and tune the WAF over time. This approach will probably cause some of your legitimate traffic to be blocked, which is why we recommend using it only when you're under threat.
72
+
> This process describes how to enable the WAF on a new or existing solution when your priority is to minimize the disturbance to your application's users. If you're under attack or imminent threat, you might want to instead deploy the WAF in prevention mode immediately. You can then use the tuning process to monitor and tune the WAF over time. This approach will probably cause some of your legitimate traffic to be blocked, which is why we recommend using it only when you're under threat.
73
73
1. Follow the [guidance for tuning the WAF](./waf-front-door-tuning.md). This process requires that you enable diagnostic logging, review the logs regularly, and add rule exclusions and other mitigations.
74
74
1. Repeat this whole process and check the logs regularly, until you're satisfied that no legitimate traffic is being blocked. The whole process might take several weeks. Ideally, you should see fewer false-positive detections after each tuning change that you make.
75
-
1. Finally, enable the WAF in **Prevention** mode.
75
+
1. Finally, enable the WAF in prevention mode.
76
76
77
77
Even after you're running the WAF in production, you should keep monitoring the logs to identify any other false-positive detections. Regularly reviewing the logs also helps you identify any real attack attempts that were blocked.
78
78
@@ -84,7 +84,7 @@ sections:
84
84
- question: |
85
85
Is DDoS protection integrated with Azure Front Door?
86
86
answer: |
87
-
Azure Front Door is globally distributed at Azure network edges. It can absorb and geographically isolate large-volume attacks. You can create custom WAF policy to automatically block and rate limit HTTP and HTTPS attacks that have known signatures. You can also enable distributed denial-of-service (DDoS) network protection on the virtual network where your back ends are deployed.
87
+
Azure Front Door is globally distributed at Azure network edges. It can absorb and geographically isolate large-volume attacks. You can create a custom WAF policy to automatically block and rate limit HTTP and HTTPS attacks that have known signatures. You can also enable distributed denial-of-service (DDoS) network protection on the virtual network where your back ends are deployed.
88
88
89
89
Customers of the Azure DDoS Protection service receive additional benefits, including cost protection, a service-level agreement (SLA) guarantee, and access to experts from the DDoS Rapid Response Team for immediate help during an attack. For more information, see [DDoS Protection on Azure Front Door](../../frontdoor/front-door-ddos.md).
90
90
@@ -127,5 +127,5 @@ additionalContent: |
127
127
128
128
## Related content
129
129
130
-
- Learn more about [Azure Web Application Firewall](../overview.md).
131
-
- Learn more about [Azure Front Door](../../frontdoor/front-door-overview.md).
130
+
- [What is Azure Web Application Firewall?](../overview.md)
131
+
- [What is Azure Front Door?](../../frontdoor/front-door-overview.md)
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/ag-overview.md
+18-12Lines changed: 18 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ All of the following Azure Web Application Firewall features exist inside a web
22
22
23
23
:::image type="content" source="../media/ag-overview/waf1.png" alt-text="Diagram that illustrates how a web application firewall works with Azure Application Gateway.":::
24
24
25
-
Application Gateway operates as an application delivery controller. It offers Transport Layer Security (TLS) (previously known as Secure Sockets Layer or SSL), termination, cookie-based session affinity, round-robin load distribution, content-based routing, the ability to host multiple websites, and security enhancements.
25
+
Application Gateway operates as an application delivery controller. It offers Transport Layer Security (TLS) (previously known as Secure Sockets Layer or SSL) termination, cookie-based session affinity, round-robin load distribution, content-based routing, the ability to host multiple websites, and security enhancements.
26
26
27
27
Application Gateway enhances security through TLS policy management and end-to-end TLS support. Integrating Azure Web Application Firewall into Application Gateway fortifies application security. This combination actively defends your web applications against common vulnerabilities and offers a centrally manageable location.
28
28
@@ -93,7 +93,7 @@ Application Gateway supports multiple rule sets, including CRS 3.2, CRS 3.1, and
93
93
94
94
### Custom rules
95
95
96
-
Application Gateway also supports the creation of your own custom rules. Application Gateway evaluates custom rules for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. If a request meets a set of conditions, the WAF takes an action to allow or block. For more information on custom rules, see [Custom rules for Application Gateway](custom-waf-rules-overview.md).
96
+
Application Gateway supports the creation of your own custom rules. Application Gateway evaluates custom rules for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. If a request meets a set of conditions, the WAF takes an action to allow or block. For more information on custom rules, see [Custom rules for Application Gateway](custom-waf-rules-overview.md).
97
97
98
98
The `Geomatch` operator is now available for custom rules. For more information, see [Geomatch custom rules](geomatch-custom-rules.md).
99
99
@@ -132,20 +132,20 @@ You can configure the Application Gateway WAF to run in the following modes:
132
132
-**Prevention mode**: Blocks intrusions and attacks that the rules detect. The attacker receives a "403 unauthorized access" exception, and the connection is closed. Prevention mode records such attacks in the WAF logs.
133
133
134
134
> [!NOTE]
135
-
> We recommend that you run a newly deployed WAF in detection mode for a short period of time in a production environment. Doing so provides the opportunity to obtain [firewall logs](../../application-gateway/application-gateway-diagnostics.md#firewall-log) and update any exceptions or [custom rules](./custom-waf-rules-overview.md) before transitioning to prevention mode. It also helps reduce the occurrence of unexpected blocked traffic.
135
+
> We recommend that you run a newly deployed WAF in detection mode for a short period in a production environment. Doing so provides the opportunity to obtain [firewall logs](../../application-gateway/application-gateway-diagnostics.md#firewall-log) and update any exceptions or [custom rules](./custom-waf-rules-overview.md) before transitioning to prevention mode. It also helps reduce the occurrence of unexpected blocked traffic.
136
136
137
137
### WAF engine
138
138
139
-
The WAF engine is the component that inspects traffic and detects whether a request contains a signature that indicates a potential attack. When you use CRS 3.2 or later, your web application firewall runs the new [WAF engine](waf-engine.md), which gives you higher performance and an improved set of features. When you use earlier versions of CRS, your WAF runs on an older engine. New features are available only on the new WAF engine.
139
+
The WAF engine is the component that inspects traffic and detects whether a request contains a signature that indicates a potential attack. When you use CRS 3.2 or later, your web application firewall runs the new [WAF engine](waf-engine.md), which gives you higher performance and an improved set of features. When you use earlier versions of the CRS, your WAF runs on an older engine. New features are available only on the new WAF engine.
140
140
141
141
### WAF actions
142
142
143
143
You can choose which action the WAF runs when a request matches a rule condition. Application Gateway supports the following actions:
144
144
145
-
-**Allow**: The request passes through the WAF and is forwarded to the back end. No further lower-priority rules can block this request. These actions apply only to the Bot Manager Rule Set. They don't apply to CRS.
145
+
-**Allow**: The request passes through the WAF and is forwarded to the back end. No further lower-priority rules can block this request. These actions apply only to the Bot Manager Rule Set. They don't apply to the CRS.
146
146
-**Block**: The request is blocked. The WAF sends a response to the client without forwarding the request to the back end.
147
147
-**Log**: The request is logged in the WAF logs. The WAF continues to evaluate lower-priority rules.
148
-
-**Anomaly score**: This action is the default for CRS. The total anomaly score is incremented when a request matches a rule with this action. Anomaly scoring doesn't apply to the Bot Manager Rule Set.
148
+
-**Anomaly score**: This action is the default for the CRS. The total anomaly score is incremented when a request matches a rule with this action. Anomaly scoring doesn't apply to the Bot Manager Rule Set.
149
149
150
150
### Anomaly scoring mode
151
151
@@ -187,7 +187,9 @@ To learn more about using logs, see [Diagnostic logs for Application Gateway](..
187
187
188
188
[Defender for Cloud](../../security-center/security-center-introduction.md?toc=/azure/web-application-firewall/toc.json) helps you prevent, detect, and respond to threats. It provides increased visibility into, and control over, the security of your Azure resources. Application Gateway is [integrated with Defender for Cloud](../../security-center/security-center-partner-integration.md#integrated-azure-security-solutions).
189
189
190
-
Defender for Cloud scans your environment to detect unprotected web applications. It can recommend an Application Gateway WAF to help protect these vulnerable resources. You create the firewalls directly from Defender for Cloud. These WAF instances are integrated with Defender for Cloud. They send alerts and health information to Defender for Cloud for reporting.
190
+
Defender for Cloud scans your environment to detect unprotected web applications. It can recommend an Application Gateway WAF to help protect these vulnerable resources.
191
+
192
+
You create the firewalls directly from Defender for Cloud. These WAF instances are integrated with Defender for Cloud. They send alerts and health information to Defender for Cloud for reporting.
191
193
192
194
#### Microsoft Sentinel
193
195
@@ -197,7 +199,11 @@ With the firewall events workbook built into Azure Web Application Firewall, you
197
199
198
200
#### Azure Monitor workbook for WAF
199
201
200
-
The Azure Monitor workbook for WAF enables custom visualization of security-relevant WAF events across several filterable panels. It works with all WAF types, including Application Gateway, Azure Front Door, and Azure Content Delivery Network. You can filter it based on WAF type or a specific WAF instance. You import it via Azure Resource Manager template or gallery template. To deploy this workbook, see the [GitHub repository for Azure Web Application Firewall](https://aka.ms/AzWAFworkbook).
202
+
The Azure Monitor workbook for WAF enables custom visualization of security-relevant WAF events across several filterable panels. It works with all WAF types, including Application Gateway, Azure Front Door, and Azure Content Delivery Network.
203
+
204
+
You can filter this workbook based on WAF type or a specific WAF instance. You import it via Azure Resource Manager template or gallery template.
205
+
206
+
To deploy this workbook, see the [GitHub repository for Azure Web Application Firewall](https://aka.ms/AzWAFworkbook).
201
207
202
208
#### Logging
203
209
@@ -249,7 +255,7 @@ To learn what's new with Azure Web Application Firewall, see [Azure updates](htt
249
255
250
256
## Related content
251
257
252
-
-Learn more about [WAF managed rules](application-gateway-crs-rulegroups-rules.md).
253
-
-Learn more about [custom rules](custom-waf-rules-overview.md).
254
-
-Learn about [Azure Web Application Firewall on Azure Front Door](../afds/afds-overview.md).
255
-
-Learn about [Azure network security](../../networking/security/index.yml).
258
+
-[Azure Web Application Firewall DRS and CRS rule groups and rules](application-gateway-crs-rulegroups-rules.md)
259
+
-[Custom rules for Azure Web Application Firewall v2 on Azure Application Gateway](custom-waf-rules-overview.md)
260
+
-[Azure Web Application Firewall on Azure Front Door](../afds/afds-overview.md)
0 commit comments