Skip to content

Commit 8ecc1c5

Browse files
committed
edit pass: azure-web-application-firewall-documentation
1 parent 9b7b23a commit 8ecc1c5

2 files changed

Lines changed: 25 additions & 19 deletions

File tree

articles/web-application-firewall/afds/waf-faq.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ sections:
5252
When Azure Web Application Firewall is integrated with Azure Front Door, the WAF is a global resource. The same configuration applies across all Azure Front Door locations.
5353
5454
- question: |
55-
How do I limit access to my back end to be from Azure Front Door only?
55+
How do I make sure that only Azure Front Door can access the back end in my network?
5656
answer: |
57-
You can configure an IP access control list in your back end to allow for only Azure Front Door outbound IP address ranges by using an Azure Front Door service tag and deny any direct access from the internet. Service tags are supported for you to use on your virtual network. Additionally, you can verify that the `X-Forwarded-Host` HTTP header field is valid for your web application.
57+
You can configure an IP access control list in your back end to allow for only Azure Front Door outbound IP address ranges by using an Azure Front Door service tag and deny any direct access from the internet. Service tags are supported for your virtual network. Additionally, you can verify that the `X-Forwarded-Host` HTTP header field is valid for your web application.
5858
5959
- question: |
6060
Which WAF options should I choose?
@@ -69,10 +69,10 @@ sections:
6969
1. Enable the WAF in [detection mode](./waf-front-door-create-portal.md#change-mode) to ensure that the WAF doesn't block requests while you're working through this process. We recommend this step for testing purposes on the WAF.
7070
7171
> [!IMPORTANT]
72-
> This process describes how to enable the WAF on a new or existing solution when your priority is to minimize the disturbance to your application's users. If you're under attack or imminent threat, you might want to instead deploy the WAF in **Prevention** mode immediately. You can then use the tuning process to monitor and tune the WAF over time. This approach will probably cause some of your legitimate traffic to be blocked, which is why we recommend using it only when you're under threat.
72+
> This process describes how to enable the WAF on a new or existing solution when your priority is to minimize the disturbance to your application's users. If you're under attack or imminent threat, you might want to instead deploy the WAF in prevention mode immediately. You can then use the tuning process to monitor and tune the WAF over time. This approach will probably cause some of your legitimate traffic to be blocked, which is why we recommend using it only when you're under threat.
7373
1. Follow the [guidance for tuning the WAF](./waf-front-door-tuning.md). This process requires that you enable diagnostic logging, review the logs regularly, and add rule exclusions and other mitigations.
7474
1. Repeat this whole process and check the logs regularly, until you're satisfied that no legitimate traffic is being blocked. The whole process might take several weeks. Ideally, you should see fewer false-positive detections after each tuning change that you make.
75-
1. Finally, enable the WAF in **Prevention** mode.
75+
1. Finally, enable the WAF in prevention mode.
7676
7777
Even after you're running the WAF in production, you should keep monitoring the logs to identify any other false-positive detections. Regularly reviewing the logs also helps you identify any real attack attempts that were blocked.
7878
@@ -84,7 +84,7 @@ sections:
8484
- question: |
8585
Is DDoS protection integrated with Azure Front Door?
8686
answer: |
87-
Azure Front Door is globally distributed at Azure network edges. It can absorb and geographically isolate large-volume attacks. You can create custom WAF policy to automatically block and rate limit HTTP and HTTPS attacks that have known signatures. You can also enable distributed denial-of-service (DDoS) network protection on the virtual network where your back ends are deployed.
87+
Azure Front Door is globally distributed at Azure network edges. It can absorb and geographically isolate large-volume attacks. You can create a custom WAF policy to automatically block and rate limit HTTP and HTTPS attacks that have known signatures. You can also enable distributed denial-of-service (DDoS) network protection on the virtual network where your back ends are deployed.
8888
8989
Customers of the Azure DDoS Protection service receive additional benefits, including cost protection, a service-level agreement (SLA) guarantee, and access to experts from the DDoS Rapid Response Team for immediate help during an attack. For more information, see [DDoS Protection on Azure Front Door](../../frontdoor/front-door-ddos.md).
9090
@@ -127,5 +127,5 @@ additionalContent: |
127127
128128
## Related content
129129
130-
- Learn more about [Azure Web Application Firewall](../overview.md).
131-
- Learn more about [Azure Front Door](../../frontdoor/front-door-overview.md).
130+
- [What is Azure Web Application Firewall?](../overview.md)
131+
- [What is Azure Front Door?](../../frontdoor/front-door-overview.md)

articles/web-application-firewall/ag/ag-overview.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ All of the following Azure Web Application Firewall features exist inside a web
2222
2323
:::image type="content" source="../media/ag-overview/waf1.png" alt-text="Diagram that illustrates how a web application firewall works with Azure Application Gateway.":::
2424

25-
Application Gateway operates as an application delivery controller. It offers Transport Layer Security (TLS) (previously known as Secure Sockets Layer or SSL), termination, cookie-based session affinity, round-robin load distribution, content-based routing, the ability to host multiple websites, and security enhancements.
25+
Application Gateway operates as an application delivery controller. It offers Transport Layer Security (TLS) (previously known as Secure Sockets Layer or SSL) termination, cookie-based session affinity, round-robin load distribution, content-based routing, the ability to host multiple websites, and security enhancements.
2626

2727
Application Gateway enhances security through TLS policy management and end-to-end TLS support. Integrating Azure Web Application Firewall into Application Gateway fortifies application security. This combination actively defends your web applications against common vulnerabilities and offers a centrally manageable location.
2828

@@ -93,7 +93,7 @@ Application Gateway supports multiple rule sets, including CRS 3.2, CRS 3.1, and
9393

9494
### Custom rules
9595

96-
Application Gateway also supports the creation of your own custom rules. Application Gateway evaluates custom rules for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. If a request meets a set of conditions, the WAF takes an action to allow or block. For more information on custom rules, see [Custom rules for Application Gateway](custom-waf-rules-overview.md).
96+
Application Gateway supports the creation of your own custom rules. Application Gateway evaluates custom rules for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. If a request meets a set of conditions, the WAF takes an action to allow or block. For more information on custom rules, see [Custom rules for Application Gateway](custom-waf-rules-overview.md).
9797

9898
The `Geomatch` operator is now available for custom rules. For more information, see [Geomatch custom rules](geomatch-custom-rules.md).
9999

@@ -132,20 +132,20 @@ You can configure the Application Gateway WAF to run in the following modes:
132132
- **Prevention mode**: Blocks intrusions and attacks that the rules detect. The attacker receives a "403 unauthorized access" exception, and the connection is closed. Prevention mode records such attacks in the WAF logs.
133133

134134
> [!NOTE]
135-
> We recommend that you run a newly deployed WAF in detection mode for a short period of time in a production environment. Doing so provides the opportunity to obtain [firewall logs](../../application-gateway/application-gateway-diagnostics.md#firewall-log) and update any exceptions or [custom rules](./custom-waf-rules-overview.md) before transitioning to prevention mode. It also helps reduce the occurrence of unexpected blocked traffic.
135+
> We recommend that you run a newly deployed WAF in detection mode for a short period in a production environment. Doing so provides the opportunity to obtain [firewall logs](../../application-gateway/application-gateway-diagnostics.md#firewall-log) and update any exceptions or [custom rules](./custom-waf-rules-overview.md) before transitioning to prevention mode. It also helps reduce the occurrence of unexpected blocked traffic.
136136
137137
### WAF engine
138138

139-
The WAF engine is the component that inspects traffic and detects whether a request contains a signature that indicates a potential attack. When you use CRS 3.2 or later, your web application firewall runs the new [WAF engine](waf-engine.md), which gives you higher performance and an improved set of features. When you use earlier versions of CRS, your WAF runs on an older engine. New features are available only on the new WAF engine.
139+
The WAF engine is the component that inspects traffic and detects whether a request contains a signature that indicates a potential attack. When you use CRS 3.2 or later, your web application firewall runs the new [WAF engine](waf-engine.md), which gives you higher performance and an improved set of features. When you use earlier versions of the CRS, your WAF runs on an older engine. New features are available only on the new WAF engine.
140140

141141
### WAF actions
142142

143143
You can choose which action the WAF runs when a request matches a rule condition. Application Gateway supports the following actions:
144144

145-
- **Allow**: The request passes through the WAF and is forwarded to the back end. No further lower-priority rules can block this request. These actions apply only to the Bot Manager Rule Set. They don't apply to CRS.
145+
- **Allow**: The request passes through the WAF and is forwarded to the back end. No further lower-priority rules can block this request. These actions apply only to the Bot Manager Rule Set. They don't apply to the CRS.
146146
- **Block**: The request is blocked. The WAF sends a response to the client without forwarding the request to the back end.
147147
- **Log**: The request is logged in the WAF logs. The WAF continues to evaluate lower-priority rules.
148-
- **Anomaly score**: This action is the default for CRS. The total anomaly score is incremented when a request matches a rule with this action. Anomaly scoring doesn't apply to the Bot Manager Rule Set.
148+
- **Anomaly score**: This action is the default for the CRS. The total anomaly score is incremented when a request matches a rule with this action. Anomaly scoring doesn't apply to the Bot Manager Rule Set.
149149

150150
### Anomaly scoring mode
151151

@@ -187,7 +187,9 @@ To learn more about using logs, see [Diagnostic logs for Application Gateway](..
187187

188188
[Defender for Cloud](../../security-center/security-center-introduction.md?toc=/azure/web-application-firewall/toc.json) helps you prevent, detect, and respond to threats. It provides increased visibility into, and control over, the security of your Azure resources. Application Gateway is [integrated with Defender for Cloud](../../security-center/security-center-partner-integration.md#integrated-azure-security-solutions).
189189

190-
Defender for Cloud scans your environment to detect unprotected web applications. It can recommend an Application Gateway WAF to help protect these vulnerable resources. You create the firewalls directly from Defender for Cloud. These WAF instances are integrated with Defender for Cloud. They send alerts and health information to Defender for Cloud for reporting.
190+
Defender for Cloud scans your environment to detect unprotected web applications. It can recommend an Application Gateway WAF to help protect these vulnerable resources.
191+
192+
You create the firewalls directly from Defender for Cloud. These WAF instances are integrated with Defender for Cloud. They send alerts and health information to Defender for Cloud for reporting.
191193

192194
#### Microsoft Sentinel
193195

@@ -197,7 +199,11 @@ With the firewall events workbook built into Azure Web Application Firewall, you
197199

198200
#### Azure Monitor workbook for WAF
199201

200-
The Azure Monitor workbook for WAF enables custom visualization of security-relevant WAF events across several filterable panels. It works with all WAF types, including Application Gateway, Azure Front Door, and Azure Content Delivery Network. You can filter it based on WAF type or a specific WAF instance. You import it via Azure Resource Manager template or gallery template. To deploy this workbook, see the [GitHub repository for Azure Web Application Firewall](https://aka.ms/AzWAFworkbook).
202+
The Azure Monitor workbook for WAF enables custom visualization of security-relevant WAF events across several filterable panels. It works with all WAF types, including Application Gateway, Azure Front Door, and Azure Content Delivery Network.
203+
204+
You can filter this workbook based on WAF type or a specific WAF instance. You import it via Azure Resource Manager template or gallery template.
205+
206+
To deploy this workbook, see the [GitHub repository for Azure Web Application Firewall](https://aka.ms/AzWAFworkbook).
201207

202208
#### Logging
203209

@@ -249,7 +255,7 @@ To learn what's new with Azure Web Application Firewall, see [Azure updates](htt
249255

250256
## Related content
251257

252-
- Learn more about [WAF managed rules](application-gateway-crs-rulegroups-rules.md).
253-
- Learn more about [custom rules](custom-waf-rules-overview.md).
254-
- Learn about [Azure Web Application Firewall on Azure Front Door](../afds/afds-overview.md).
255-
- Learn about [Azure network security](../../networking/security/index.yml).
258+
- [Azure Web Application Firewall DRS and CRS rule groups and rules](application-gateway-crs-rulegroups-rules.md)
259+
- [Custom rules for Azure Web Application Firewall v2 on Azure Application Gateway](custom-waf-rules-overview.md)
260+
- [Azure Web Application Firewall on Azure Front Door](../afds/afds-overview.md)
261+
- [Azure network security documentation](../../networking/security/index.yml)

0 commit comments

Comments
 (0)