Here is a step-by-step guide for installing WAF policy
1. Access the Microsoft Azure portal and in the search engine at the top of the screen, search for and select Web Application Firewall (WAF) policy.
2. On the Basics tab of the Create WAF policy page, type or select the following information and accept the defaults for the rest of the configuration:
Configuración | Value |
Directive of (Policy for) | Select WAF global (Front Door) . |
Subscription | Select your Azure subscription. |
Resource group | Select the name of the Front Door resource group. |
Name of the board (Policy Name) | Type a unique name for the WAF policy. |
Directive Status | Set to Enabled. |
- Localtion East US 2
- Policy mode, Select Prevention
3. In Managed rules we must configure the same rules that are active in production,
in this case we have 3 rules unchecked in the Request-Application-Attack-SQLI policy
- Detects basic SQL authentication bypass attempts 1/3
- Detects basic SQL authentication bypass attempts 2/3
- Detects basic SQL authentication bypass attempts 3/3
Which should be disabled in this configuration as well.
4. In Policy settings the default values are left as follows
5. Under Association select + Associate a Front Door profile, enter the following settings and select Add:
No tag is made to this policy.
6. In Review+create we click on Create
7. Realice pruebas para asegurarse de que el WAF está funcionando correctamente.
8. Monitoree el WAF de manera regular para detectar y corregir cualquier problema.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article