You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/ag-overview.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,23 +81,25 @@ You can configure a WAF policy and associate that policy with one or more applic
81
81
- Custom rules that you create
82
82
- Managed rule sets that are collections of Azure-managed preconfigured rules
83
83
84
-
When both are present, the WAF processes custom rules before processing the rules in a managed rule set. A rule consists of a match condition, a priority, and an action. Supported action types are `ALLOW`, `BLOCK`, and `LOG`. You can create a fully customized policy that meets your specific requirements for application protection by combining managed and custom rules.
84
+
When both are present, the WAF processes custom rules before processing the rules in a managed rule set.
85
+
86
+
A rule consists of a match condition, a priority, and an action. Supported action types are `ALLOW`, `BLOCK`, and `LOG`. You can create a fully customized policy that meets your specific requirements for application protection by combining managed and custom rules.
85
87
86
88
The WAF processes rules within a policy in a priority order. Priority is a unique integer that defines the order of rules to process. A smaller integer value denotes a higher priority, and the WAF evaluates those rules before rules that have a higher integer value. After the WAF matches a rule with a request, it applies the corresponding action that the rule defines to the request. After the WAF processes such a match, rules that have lower priorities aren't processed further.
87
89
88
90
A web application that Application Gateway delivers can have a WAF policy associated with it at the global level, at a per-site level, or at a per-URI level.
89
91
90
-
### Rule sets
91
-
92
-
Application Gateway supports multiple rule sets, including CRS 3.2, CRS 3.1, and CRS 3.0. These rules help protect your web applications from malicious activity. For more information, see [Web application firewall DRS and CRS rule groups and rules](application-gateway-crs-rulegroups-rules.md).
93
-
94
92
### Custom rules
95
93
96
94
Application Gateway supports the creation of your own custom rules. Application Gateway evaluates custom rules for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. If a request meets a set of conditions, the WAF takes an action to allow or block. For more information on custom rules, see [Custom rules for Application Gateway](custom-waf-rules-overview.md).
97
95
98
96
The `Geomatch` operator is now available for custom rules. For more information, see [Geomatch custom rules](geomatch-custom-rules.md).
99
97
100
-
### Bot Manager Rule Set
98
+
### Rule sets
99
+
100
+
Application Gateway supports multiple rule sets, including CRS 3.2, CRS 3.1, and CRS 3.0. These rules help protect your web applications from malicious activity. For more information, see [Web application firewall DRS and CRS rule groups and rules](application-gateway-crs-rulegroups-rules.md).
101
+
102
+
#### Bot Manager Rule Set
101
103
102
104
You can enable a managed Bot Manager Rule Set to take custom actions on requests from all bot categories.
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/application-gateway-waf-faq.yml
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ metadata:
8
8
ms.topic: faq
9
9
ms.date: 08/05/2025
10
10
title: Frequently asked questions for Azure Web Application Firewall on Application Gateway
11
-
summary: This article answers common questions about features and functionality for Azure Web Application Firewall on Application Gateway.
11
+
summary: This article answers common questions about features and functionality for Azure Web Application Firewall on Azure Application Gateway.
12
12
13
13
14
14
sections:
@@ -27,7 +27,7 @@ sections:
27
27
The WAF tier of Application Gateway supports all the features available in the Standard tier.
28
28
29
29
- question: |
30
-
How do I monitor the Application Gateway WAF?
30
+
How do I monitor the WAF?
31
31
answer: |
32
32
Monitor the WAF through diagnostic logging. For more information, see [Diagnostic logs for Application Gateway](../../application-gateway/application-gateway-diagnostics.md).
33
33
@@ -42,9 +42,9 @@ sections:
42
42
Yes. For more information, see [Customize WAF rules](application-gateway-customize-waf-rules-portal.md).
43
43
44
44
- question: |
45
-
What rules are currently available for the Application Gateway WAF?
45
+
What rules are currently available for the WAF?
46
46
answer: |
47
-
The Application Gateway WAF currently supports Core Rule Set (CRS) [3.2](application-gateway-crs-rulegroups-rules.md#owasp32), [3.1](application-gateway-crs-rulegroups-rules.md#owasp31), and [3.0](application-gateway-crs-rulegroups-rules.md#owasp30). These rules provide baseline security against most of the top 10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
47
+
The WAF currently supports Core Rule Set (CRS) [3.2](application-gateway-crs-rulegroups-rules.md#owasp32), [3.1](application-gateway-crs-rulegroups-rules.md#owasp31), and [3.0](application-gateway-crs-rulegroups-rules.md#owasp30). These rules provide baseline security against most of the top 10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
48
48
49
49
* Protection against SQL injection
50
50
* Protection against cross-site scripting
@@ -59,7 +59,7 @@ sections:
59
59
CRS 2.2.9 is no longer supported for new WAF policies. We recommend that you upgrade to the latest CRS version. You can't use CRS 2.2.9 along with CRS 3.2/DRS 2.1 and later versions.
60
60
61
61
- question: |
62
-
What content types does the Application Gateway WAF support?
62
+
What content types does the WAF support?
63
63
answer: |
64
64
The Application Gateway WAF supports the following content types for managed rules:
65
65
@@ -76,17 +76,17 @@ sections:
76
76
* `multipart/form-data`
77
77
78
78
- question: |
79
-
Does the Application Gateway WAF support DDoS protection?
79
+
Does the WAF support DDoS protection?
80
80
answer: |
81
81
Yes. You can enable distributed denial-of-service (DDoS) protection on the virtual network where the application gateway is deployed. This setting ensures that the Azure DDoS Protection service also helps protect the application gateway's virtual IP (VIP).
82
82
83
83
- question: |
84
-
Does the Application Gateway WAF store customer data?
84
+
Does the WAF store customer data?
85
85
answer: |
86
86
No, the WAF doesn't store customer data.
87
87
88
88
- question: |
89
-
How does the Application Gateway WAF work with WebSocket?
89
+
How does the WAF work with WebSocket?
90
90
answer: |
91
91
Azure Application Gateway natively supports WebSocket. WebSocket on the Application Gateway WAF doesn't require any extra configuration to work. However, the WAF doesn't inspect the WebSocket traffic. After the initial handshake between client and server, the data exchange between client and server can be of any format (for example, binary or encrypted). So the WAF can't always parse the data. It just acts as a pass-through proxy for the data.
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/waf-application-gateway-for-containers-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Azure Web Application Firewall provides real-time protection for these applicati
23
23
24
24
## Configuration
25
25
26
-
To use Azure Web Application Firewall on your Application Gateway for Containers deployment, you need to attach your [WAF policy](create-waf-policy-ag.md) via a `SecurityPolicy` resource. This new Azure Resource Manager child resource is part of the Application Gateway for Containers integration. Your Application Load Balancer (ALB) Controller references it. It helps define the scope of how your WAF policy is applied to your application's traffic.
26
+
To use Azure Web Application Firewall on your Application Gateway for Containers deployment, you need to attach your [WAF policy](create-waf-policy-ag.md) via a `SecurityPolicy` resource. This new Azure Resource Manager child resource is part of the Application Gateway for Containers integration. It's referenced by your Application Load Balancer (ALB) Controller and helps define the scope of how your WAF policy is applied to your application's traffic.
27
27
28
28
Application Gateway for Containers also introduces a new resource called `WebApplicationFirewallPolicy`. This custom resource defines at which point the WAF policy is applied. You can configure it at the listener or route path level, via your Kubernetes resource's YAML file.
29
29
@@ -61,7 +61,7 @@ The following functionality isn't supported on a WAF policy that's associated wi
61
61
Azure Web Application Firewall usage is billed separately from Application Gateway for Containers usage. When you enable Azure Web Application Firewall on your Application Gateway for Containers resource, two WAF-specific meters are added to your bill:
62
62
63
63
- **1 AGC WAF Hour**: A fixed cost charged for the duration that a security policy references a WAF policy.
64
-
- **1M WAF Requests**: A consumption-based meter that bills per 1 million requests processed by the WAF and charges for each enabled rule set. For example, if you enable both the Default Rule Set (DRS) and the Bot Manager Rule Set, you're billed for two rule sets.
64
+
- **1M WAF Requests**: A consumption-based meter that bills per 1 million requests processed by the WAF and charges for each enabled rule set. For example, if you enable both the DRS and the Bot Manager Rule Set, you're billed for two rule sets.
65
65
66
66
For more pricing information, see [Application Gateway pricing](https://azure.microsoft.com/pricing/details/application-gateway) and [Azure Web Application Firewall pricing](https://azure.microsoft.com/pricing/details/web-application-firewall).
Copy file name to clipboardExpand all lines: articles/web-application-firewall/cdn/cdn-overview.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,11 +15,13 @@ ms.date: 10/16/2023
15
15
An Azure Web Application Firewall deployment on Azure Content Delivery Network provides centralized protection for your web content. Azure Web Application Firewall defends your web services against common exploits and vulnerabilities. It helps keep your service highly available for your users and helps you meet compliance requirements.
16
16
17
17
> [!IMPORTANT]
18
-
> The preview of Azure Web Application Firewall on Azure Content Delivery Network is no longer accepting new customers. We encourage customers to use [Azure Web Application Firewall on Azure Front Door](../afds/afds-overview.md) instead. We provide existing customers with a preview service-level agreement. Certain features might not be supported or might have constrained capabilities. For details, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
18
+
> The preview of Azure Web Application Firewall on Azure Content Delivery Network is no longer accepting new customers. We encourage customers to use [Azure Web Application Firewall on Azure Front Door](../afds/afds-overview.md) instead.
19
+
>
20
+
> We provide existing customers with a preview service-level agreement. Certain features might not be supported or might have constrained capabilities. For details, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
19
21
20
22
Azure Web Application Firewall on Azure Content Delivery Network is a global and centralized solution. It's deployed on Azure network edge locations around the globe. Azure Web Application Firewall stops malicious attacks close to the attack sources, before they reach your origin. You get global protection at scale without sacrificing performance.
21
23
22
-
A web application firewall (WAF) policy easily links to any content delivery network (CDN) endpoint in your subscription. You can deploy new rules within minutes, so you can respond quickly to changing threat patterns.
24
+
A web application firewall (WAF) policy links to any content delivery network (CDN) endpoint in your subscription. You can deploy new rules within minutes, so you can respond quickly to changing threat patterns.
23
25
24
26

25
27
@@ -30,7 +32,9 @@ You can configure a WAF policy and associate that policy with one or more CDN en
30
32
-**Custom rules**: Rules that you can create yourself.
31
33
-**Managed rule sets**: Azure-managed preconfigured rules that you can enable.
32
34
33
-
When both are present, the WAF processes custom rules before processing the rules in a managed rule set. A rule consists of a match condition, a priority, and an action. Supported action types are `ALLOW`, `BLOCK`, `LOG`, and `REDIRECT`. You can create a fully customized policy that meets your specific requirements for application protection by combining managed and custom rules.
35
+
When both are present, the WAF processes custom rules before processing the rules in a managed rule set.
36
+
37
+
A rule consists of a match condition, a priority, and an action. Supported action types are `ALLOW`, `BLOCK`, `LOG`, and `REDIRECT`. You can create a fully customized policy that meets your specific requirements for application protection by combining managed and custom rules.
34
38
35
39
The WAF processes rules within a policy in a priority order. Priority is a unique integer that defines the order of rules to process. Smaller numbers are a higher priority, and the WAF evaluates those rules before rules that have a larger value. After the WAF matches a rule with a request, it applies the corresponding action that the rule defines to the request. After the WAF processes such a match, rules that have lower priorities aren't processed further.
36
40
@@ -78,7 +82,7 @@ Azure-managed rule sets provide a way to deploy protection against a common set
78
82
79
83
The version number of the Default Rule Set increments when new attack signatures are added to the rule set.
80
84
81
-
The Default Rule Set is enabled by default in *detection* mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions (`ALLOW`, `BLOCK`, `REDIRECT`, and `LOG`) per rule. The default action for the managed Default Rule Set is `BLOCK`.
85
+
The Default Rule Set is enabled by default in *detection* mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions (`ALLOW`, `BLOCK`, `LOG`, and `REDIRECT`) per rule. The default action for the managed Default Rule Set is `BLOCK`.
82
86
83
87
Custom rules are always applied before the WAF evaluates the rules in the Default Rule Set. If a request matches a custom rule, the WAF applies the corresponding rule action. The request is either blocked or passed through to the back end. No other custom rules or rules in the Default Rule Set are processed. You can also remove the Default Rule Set from your WAF policies.
84
88
@@ -93,10 +97,10 @@ You can configure a WAF policy to run in the following two modes:
93
97
94
98
You can choose one of the following actions when a request matches a rule's conditions:
95
99
96
-
-**Allow**: The request passes through the WAF and is forwarded to the back end. No further lower-priority rules can block this request.
97
-
-**Block**: The request is blocked. The WAF sends a response to the client without forwarding the request to the back end.
98
-
-**Log**: The request is logged in the WAF logs. The WAF continues to evaluate lower-priority rules.
99
-
-**Redirect**: The WAF redirects the request to the specified URI. The specified URI is a policy-level setting. After you configure the setting, all requests that match the **Redirect** action are sent to that URI.
100
+
-`ALLOW`: The request passes through the WAF and is forwarded to the back end. No further lower-priority rules can block this request.
101
+
-`BLOCK`: The request is blocked. The WAF sends a response to the client without forwarding the request to the back end.
102
+
-`LOG`: The request is logged in the WAF logs. The WAF continues to evaluate lower-priority rules.
103
+
-`REDIRECT`: The WAF redirects the request to the specified URI. The specified URI is a policy-level setting. After you configure the setting, all requests that match the `REDIRECT` action are sent to that URI.
Copy file name to clipboardExpand all lines: articles/web-application-firewall/overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,12 +34,12 @@ Azure Web Application Firewall can be deployed with these Microsoft services:
34
34
- Azure Front Door
35
35
- Azure Content Delivery Network
36
36
37
-
Azure Web Application Firewall on Azure Content Delivery Network and Application Gateway for Containers are currently in public preview. Azure Web Application Firewall has features that are customized for each specific service.
37
+
Azure Web Application Firewall on Azure Content Delivery Network and Azure Web Application Firewall on Application Gateway for Containers are currently in preview. Azure Web Application Firewall has features that are customized for each specific service.
38
38
39
39
## Related content
40
40
41
-
-For more information about Azure Web Application Firewall on Application Gateway, see [What is Azure Web Application Firewall on Azure Application Gateway?](./ag/ag-overview.md).
42
-
-For more information about Web Application Firewall on Azure Front Door, see [Azure Web Application Firewall on Azure Front Door](./afds/afds-overview.md).
43
-
-For more information about Web Application Firewall on Content Delivery Network, see [Azure Web Application Firewall on Azure Content Delivery Network from Microsoft](./cdn/cdn-overview.md).
44
-
-To learn more about Azure Web Application Firewall, see the training module [Introduction to Azure Web Application Firewall](/training/modules/introduction-azure-web-application-firewall/).
45
-
-To learn more about Azure network security, see the [Azure network security documentation](../networking/security/index.yml).
41
+
-[What is Azure Web Application Firewall on Azure Application Gateway?](./ag/ag-overview.md)
42
+
-[Azure Web Application Firewall on Azure Front Door](./afds/afds-overview.md)
43
+
-[Azure Web Application Firewall on Azure Content Delivery Network](./cdn/cdn-overview.md)
44
+
-[Introduction to Azure Web Application Firewall](/training/modules/introduction-azure-web-application-firewall/) (training module)
0 commit comments