You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/afds/waf-front-door-best-practices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ For more information, see the following resources:
73
73
74
74
-[What is rate limiting for Azure Front Door?](waf-front-door-rate-limit.md).
75
75
-[Configure an Azure Web Application Firewall rate limit rule by using Azure PowerShell](waf-front-door-rate-limit-configure.md).
76
-
-[Why do additional requests above the threshold configured for my rate limit rule get passed to my back-end server?](waf-faq.yml#why-do-additional-requests-above-the-threshold-configured-for-my-rate-limit-rule-get-passed-to-my-backend-server-)
76
+
-[Why do additional requests above the threshold configured for my rate limit rule get passed to my back-end server?](waf-faq.yml#why-do-additional-requests-above-the-threshold-configured-for-my-rate-limit-rule-get-passed-to-my-back-end-server-)
Copy file name to clipboardExpand all lines: articles/web-application-firewall/afds/waf-front-door-drs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ A single *Critical* rule match is enough for the WAF to block a request when in
67
67
68
68
When your WAF uses an older version of the Default Rule Set (before DRS 2.0), your WAF runs in the traditional mode. Traffic that matches any rule is considered independently of any other rule matches. In traditional mode, you don't have visibility into the complete set of rules that a specific request matched.
69
69
70
-
The version of the DRS that you use also determines which content types are supported for request body inspection. For more information, see [What content types does WAF support](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ.
70
+
The version of the DRS that you use also determines which content types are supported for request body inspection. For more information, see [What content types does WAF support](waf-faq.yml#what-content-types-does-the-waf-support-) in the FAQ.
title: Azure Web Application Firewall on Application Gateway - frequently asked questions
4
-
description: This article provides answers to frequently asked questions about Web Application Firewall on Application Gateway
3
+
title: Azure Web Application Firewall on Application Gateway - Frequently Asked Questions
4
+
description: This article provides answers to frequently asked questions about Azure Web Application Firewall on Application Gateway.
5
5
author: halkazwini
6
6
ms.author: halkazwini
7
7
ms.service: azure-web-application-firewall
8
8
ms.topic: faq
9
9
ms.date: 08/05/2025
10
10
title: Frequently asked questions for Azure Web Application Firewall on Application Gateway
11
-
summary: This article answers common questions about Azure Web Application Firewall (WAF) on Azure Application Gateway features and functionality.
11
+
summary: This article answers common questions about features and functionality for Azure Web Application Firewall on Azure Application Gateway.
12
+
12
13
13
14
sections:
14
15
- name: Ignored
15
16
questions:
16
17
- question: |
17
-
What is Azure WAF?
18
+
What is Azure Web Application Firewall?
18
19
answer: |
19
-
Azure WAF is a web application firewall that helps protect your web applications from common threats such as SQL injection, cross-site scripting, and other web exploits. You can define a WAF policy consisting of a combination of custom and managed rules to control access to your web applications.
20
+
Azure Web Application Firewall is a web application firewall (WAF) that helps protect your web applications from common threats such as SQL injection, cross-site scripting, and other web exploits. You can define a WAF policy that consists of a combination of custom and managed rules to control access to your web applications.
20
21
21
-
An Azure WAF policy can be applied to web applications hosted on Application Gateway or Azure Front Door.
22
+
You can apply a WAF policy to web applications hosted on Azure Application Gateway or Azure Front Door.
22
23
23
24
- question: |
24
-
What features does the WAF SKU support?
25
+
What features does the WAF product tier support?
25
26
answer: |
26
-
The WAF SKU supports all the features available in the Standard SKU.
27
+
The WAF tier of Application Gateway supports all the features available in the Standard tier.
27
28
28
29
- question: |
29
-
How do I monitor WAF?
30
+
How do I monitor the WAF?
30
31
answer: |
31
-
Monitor WAF through diagnostic logging. For more information, see [Diagnostic logging and metrics for Application Gateway](../../application-gateway/application-gateway-diagnostics.md).
32
+
Monitor the WAF through diagnostic logging. For more information, see [Diagnostic logs for Application Gateway](../../application-gateway/application-gateway-diagnostics.md).
32
33
33
34
- question: |
34
35
Does detection mode block traffic?
@@ -38,62 +39,62 @@ sections:
38
39
- question: |
39
40
Can I customize WAF rules?
40
41
answer: |
41
-
Yes. For more information, see [Customize WAF rule groups and rules](application-gateway-customize-waf-rules-portal.md).
42
+
Yes. For more information, see [Customize WAF rules](application-gateway-customize-waf-rules-portal.md).
42
43
43
44
- question: |
44
-
What rules are currently available for WAF?
45
+
What rules are currently available for the WAF?
45
46
answer: |
46
-
WAF currently supports CRS [3.2](application-gateway-crs-rulegroups-rules.md#owasp32), [3.1](application-gateway-crs-rulegroups-rules.md#owasp31) and [3.0](application-gateway-crs-rulegroups-rules.md#owasp30). These rules provide baseline security against most of the top 10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
47
+
The WAF currently supports Core Rule Set (CRS) [3.2](application-gateway-crs-rulegroups-rules.md#owasp32), [3.1](application-gateway-crs-rulegroups-rules.md#owasp31), and [3.0](application-gateway-crs-rulegroups-rules.md#owasp30). These rules provide baseline security against most of the top 10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
47
48
48
-
* SQL injection protection
49
-
* Cross-site scripting protection
50
-
* Protection against common web attacks such as command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion attack
49
+
* Protection against SQL injection
50
+
* Protection against cross-site scripting
51
+
* Protection against common web attacks such as command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion
51
52
* Protection against HTTP protocol violations
52
-
* Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
53
+
* Protection against HTTP protocol anomalies such as missing `Host`, `User-Agent`, and `Accept` headers
53
54
* Prevention against bots, crawlers, and scanners
54
-
* Detection of common application misconfigurations (that is, Apache, IIS, and so on)
55
+
* Detection of common application misconfigurations (for example, Apacheand IIS)
55
56
56
-
For more information, see [OWASP top 10 vulnerabilities](https://owasp.org/www-project-top-ten/).
57
+
For more information, see the [OWASP top 10 vulnerabilities](https://owasp.org/www-project-top-ten/).
57
58
58
-
CRS 2.2.9 is no longer supported for new WAF policies. We recommend you upgrade to the latest CRS version. CRS 2.2.9 can't be used along with CRS 3.2/DRS 2.1 and greater versions.
59
+
CRS 2.2.9 is no longer supported for new WAF policies. We recommend that you upgrade to the latest CRS version. You can't use CRS 2.2.9 along with CRS 3.2/DRS 2.1 and later versions.
59
60
60
61
- question: |
61
-
What content types does WAF support?
62
+
What content types does the WAF support?
62
63
answer: |
63
-
Application Gateway WAF supports the following content types for managed rules:
64
+
The Application Gateway WAF supports the following content types for managed rules:
Yes. You can enable DDoS protection on the virtual network where the application gateway is deployed. This setting ensures that the Azure DDoS Protection service also protects the application gateway virtual IP (VIP).
81
+
Yes. You can enable distributed denial-of-service (DDoS) protection on the virtual network where the application gateway is deployed. This setting ensures that the Azure DDoS Protection service also helps protect the application gateway's virtual IP (VIP).
81
82
82
83
- question: |
83
-
Does WAF store customer data?
84
+
Does the WAF store customer data?
84
85
answer: |
85
-
No, WAF doesn't store customer data.
86
+
No, the WAF doesn't store customer data.
86
87
87
88
- question: |
88
-
How does the Azure WAF work with WebSockets?
89
+
How does the WAF work with WebSocket?
89
90
answer: |
90
-
Azure Application Gateway natively supports WebSocket. WebSocket on Azure WAF on Azure Application Gateway doesn't require any extra configuration to work. However, WAF doesn't inspect the WebSocket traffic. After the initial handshake between client and server, the data exchange between client and server can be of any format, for example binary or encrypted. So Azure WAF can't always parse the data, it just acts as a pass-through proxy for the data.
91
+
Azure Application Gateway natively supports WebSocket. WebSocket on the Application Gateway WAF doesn't require any extra configuration to work. However, the WAF doesn't inspect the WebSocket traffic. After the initial handshake between client and server, the data exchange between client and server can be of any format (for example, binary or encrypted). So the WAF can't always parse the data. It just acts as a pass-through proxy for the data.
91
92
92
93
For more information, see [Overview of WebSocket support in Application Gateway](../../application-gateway/application-gateway-websocket.md).
93
94
94
95
additionalContent: |
95
96
96
97
## Related content
97
98
98
-
- [Azure Web Application Firewall](../overview.md)
99
-
- [Azure Front Door](../../frontdoor/front-door-overview.md)
99
+
- [What is Azure Web Application Firewall?](../overview.md)
100
+
- [What is Azure Front Door?](../../frontdoor/front-door-overview.md)
0 commit comments