![]() ![]() ![]() In either case, the Application Gateway should be configured to log its activities to a Log Analytics workspace. Both the Application Gateway Access Log as well as the Firewall Log provide insights into which requests got blocked, for what reason and by which WAF rules. WAF policies can be configured to reject suspicious requests when in "prevention" mode or to just observe traffic when in "detection" mode. ![]() You can also associate a unique WAF policy to different scopes on Application Gateway: global, per-site, and per-URI.įor more details on this topic, check out this webinar on " Using Azure WAF Policies to Protect Your Web Application at Different Association Levels". Written in collaboration with Claessens (Senior Customer Engineer, FastTrack for Azure)Īzure Application Gateway combined with its Azure Web Application Firewall (WAF) capabilities allows you to expose web properties in a controlled and secure way. It protects against a wide range of layer 7 attacks, including attempts to SQL injection, cross-site scripting, protocol violations and so on. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |