
The most important thing to mention about Custom Rules is that they are terminating. However, there are some important concepts to understand before you create your own rules. Creating a custom rule is as simple as clicking Add Custom Rule and entering a few required fields. For more information on these, look for future blog posts here or consult the Azure WAF documentation.Ĭustom Rules can be viewed and built using the Azure Portal by navigating to Web Application Firewall Policies (WAF), selecting your policy, and clicking on the Custom Rules blade. This post focuses on Custom Rules, but it is important to understand how the managed rulesets work. If traffic is coming from a known source of bot activity, the traffic can be blocked. Managed Bot Rules – these rules identify potential bot activity by matching sources against our internal Threat Intelligence feeds.

These rules cannot be modified, but the ruleset can be tuned by using exclusions and by modifying rule actions (a topic for another post). SpiderLabs Core Ruleset (CRS), and can detect common web attacks like SQL injection, cross-site scripting, and command injection.

This makes them very powerful as the first line of defense for web applications.
