Azure – You can now define the name of the resource group used by Azure Recovery Service
This is not a major new capability but still interesting as it gives you more control, you can now define the name of the resource group being used...
You may already know that Azure offers a Web Application Firewall capability.
Until now, you were not able to define request attributes exclusions list to be omitted from the WAF evaluation process.
Well, good news, this is now possible.
The attribute supported for the exclusion:
To define your exclusions, you can use either PowerShell, Azure Cli or the administration portal.
New-AzFrontDoorWafManagedRuleExclusionObject –Variable <RequestHeaderNames, RequestCookieNames, QueryStringArgNames or RequestBodyPostArgNames> -Operator <operator – like equals, equalsany…> –Selector <pattern to match if the operator is not equalsany>
Access the WAF you want to configure the exclusion and then access the Managed Rules blade, available under the Settings section
There you can click on Manage exclusion available in the toolbar
And then you can define your exclusion rule
This is not a major new capability but still interesting as it gives you more control, you can now define the name of the resource group being used...
As you know, Azure provides a ping test to evaluate the availability of your endpoints through the use of Application Insights.
As you know Azure Front Door Service (AFD) is the solution to define, manage, and monitor the global routing for your web traffic by optimizing for...