Azure – You can now define exclusion lists in your WAF with Azure Front Door

You may already know that Azure offers a Web Application Firewall capability.

Until now, you were not able to define request attributes exclusions list to be omitted from the WAF evaluation process.

Well, good news, this is now possible.

The attribute supported for the exclusion:

  • request header,
  • cookie,
  • query string,
  • post args

To define your exclusions, you can use either PowerShell, Azure Cli or the administration portal.

PowerShell command

New-AzFrontDoorWafManagedRuleExclusionObject –Variable <RequestHeaderNames, RequestCookieNames, QueryStringArgNames or RequestBodyPostArgNames>  -Operator <operator – like equals, equalsany…> –Selector <pattern to match if the operator is not equalsany>

From the portal

Access the WAF you want to configure the exclusion and then access the Managed Rules blade, available under the Settings section

image_thumb

There you can click on Manage exclusion available in the toolbar

image_thumb[1]

And then you can define your exclusion rule

image_thumb[2]

Azure – You can now define the name of the resource group used by Azure Recovery Service

This is not a major new capability but still interesting as it gives you more control, you can now define the name of the resource group being used...

Read More

Azure – Use the standard ping test to have more ping test options

As you know, Azure provides a ping test to evaluate the availability of your endpoints through the use of Application Insights.

Read More

Azure – Front Door Service now allows you to define rules (preview)

As you know Azure Front Door Service (AFD) is the solution to define, manage, and monitor the global routing for your web traffic by optimizing for...

Read More