
Azure WAF logs offer a wealth of information for monitoring and improving your Web Application Firewall's performance. These logs can help you identify potential security threats and take corrective action before they become major issues.
Azure WAF logs can be collected and stored in Azure Monitor, allowing you to analyze and visualize the data in a more meaningful way. This provides a more comprehensive view of your WAF's performance and helps you make data-driven decisions.
By leveraging Azure WAF logs, you can gain valuable insights into your web application's traffic patterns and security posture. This can help you identify areas for improvement and optimize your WAF's configuration for better performance.
Azure WAF Logs
Azure WAF Logs provides valuable insights into the traffic flowing through your application. These logs include requests that match a WAF rule.
The log FrontDoorWebApplicationFirewallLog includes requests that match a WAF rule, while the log FrontdoorWebApplicationFirewallLog includes any request that matches a WAF rule.
The following table shows the values logged for each request:
Azure Monitor
Azure Monitor is a powerful tool that allows you to track diagnostic information, including WAF alerts and logs. It's integrated with Azure Monitor, which enables you to view and analyze logs in real-time.
You can configure WAF monitoring within the Application Gateway resource in the portal under the Diagnostics tab or through the Azure Monitor service directly. This allows you to set up custom rules and exclusions, as well as file uploads.
Azure Monitor logs are best used for general real-time monitoring of your application or looking at trends. You can also use Azure Monitor to track diagnostic information, including WAF alerts and logs, which is especially useful for troubleshooting and security purposes.
To access Azure Monitor logs, you can use different types of logs in Azure, including Activity log, Access Resource log, Performance Resource log, and Firewall Resource log. Each type of log provides valuable information for managing and troubleshooting Application Gateways.
Here are some key features of Azure Monitor logs:
Azure Monitor logs are available only for resources deployed in the Azure Resource Manager deployment model, so make sure your resources are set up correctly to take advantage of this feature.
JavaScript Challenge Metrics
Azure WAF Logs offer a range of metrics to help you monitor and analyze your web application firewall's performance.
You can track the number of requests that match JavaScript challenge WAF rules by adding the Web Application Firewall JS Challenge Request Count metric.
This metric provides valuable insights into the effectiveness of your JavaScript challenge rules and helps you identify potential security threats.
To get the most out of Azure WAF Logs, it's essential to understand how to interpret these metrics and use them to inform your security strategies.
Here are some key metrics to focus on:
- Web Application Firewall JS Challenge Request Count: tracks the number of requests that match JavaScript challenge WAF rules
Azure WAF Monitoring
Azure WAF Monitoring allows you to track diagnostic information, including WAF alerts and logs. This is integrated with Azure Monitor, which provides a centralized platform for monitoring and analyzing data from various Azure services.
You can configure WAF monitoring within the Application Gateway resource in the portal under the Diagnostics tab or through the Azure Monitor service directly. This includes custom rules and the Bot Manager Rule Set.
The Azure Monitor service provides a detailed view of WAF logs, including information on blocked requests. Each log entry includes a unique reference string that identifies the request, known as the TrackingReference.
The following table shows the properties logged for each request in the WAF logs:
This information can be used to analyze and troubleshoot WAF issues, and to improve the security and performance of your Azure applications.
Azure WAF Security
You can choose a mode depending on how you want Azure WAF to handle incoming requests. In detection mode, Azure WAF logs suspicious requests but allows them, while in prevention mode, it logs requests and blocks them.
Azure WAF logs include requests that match a WAF rule, and the log FrontDoorWebApplicationFirewallLog includes any request that matches a WAF rule.
The Azure WAF security mode is adjustable, allowing you to switch between detection and prevention modes depending on your needs. For example, you might use detection mode to test an application and identify issues like false positives and false negatives.
The following table shows the possible values for the PolicyMode property in the WAF log:
The Azure WAF security mode can be adjusted to suit your needs, allowing you to test applications and identify issues before deploying them.
Azure WAF Tools
Azure WAF Tools provide valuable insights into your web application's security. You can access WAF logs in the Azure portal under the Monitor section.
The FrontDoorWebApplicationFirewallLog includes requests that match a WAF rule, and the log shows detailed information about each request. This log includes the client's IP address, the IP port of the client, and the Host header of the request.
The Azure Monitor is integrated with WAF with Application Gateway log, allowing you to track diagnostic information including WAF alerts and logs. You can configure WAF monitoring within the Application Gateway resource in the portal under the Diagnostics tab or through the Azure Monitor service directly.
The WAF logs include various properties, such as Action, ClientIP, ClientPort, Details, Host, Policy, PolicyMode, RequestUri, RuleName, SocketIP, and TrackingReference. Each property provides specific information about the request, and you can use these properties to filter and analyze the log data.
Here is a list of the properties found in the WAF logs:
- Action: The action taken on the request.
- ClientIP: The IP address of the client that made the request.
- ClientPort: The IP port of the client that made the request.
- Details: More details on the request, including any threats that were detected.
- Host: The Host header of the request.
- Policy: The name of the WAF policy that processed the request.
- PolicyMode: The operations mode of the WAF policy.
- RequestUri: The full URI of the request.
- RuleName: The name of the WAF rule that the request matched.
- SocketIP: The source IP address seen by WAF.
- TrackingReference: The unique reference string that identifies a request served by Azure Front Door.
Azure WAF Diagnostics
Azure WAF diagnostics is a crucial aspect of monitoring and managing your Azure Web Application Firewall (WAF). You can enable detailed reporting on each request and each threat that the WAF detects.
To start, you'll need to explicitly enable logs in the Azure portal by using the Diagnostic settings tab. This will allow you to configure logs for your WAF.
You can enable three types of Azure Front Door logs: WAF logs, Access logs, and Health probe logs. Activity logs are enabled by default and provide visibility into the operations performed on your Azure resources.
The log FrontDoorWebApplicationFirewallLog includes requests that match a WAF rule. This log includes the following properties: Action, ClientIP, ClientPort, Details, Host, Policy, PolicyMode, RequestUri, RuleName, SocketIP, and TrackingReference.
Here's a breakdown of the properties you can expect to see in the WAF log:
You can use the WAF log to analyze and debug the WAF policy behavior. If logging is enabled and a WAF rule is triggered, any matching patterns are logged in plain text.
To enable logging through PowerShell, you'll need to note your storage account's resource ID and your application gateway's resource ID. You can then use the Set-AzDiagnosticSetting cmdlet to enable resource logging.
Alternatively, you can enable logging through the Azure portal by finding your resource and selecting Diagnostic settings. From there, you can add a diagnostic setting and choose where to store the logs.
The firewall log is generated only if you have enabled it for each application gateway. This log includes the following properties: instanceId, clientIp, requestUri, ruleSetType, ruleSetVersion, ruleId, message, action, site, details, details.message, details.data, details.file, details.line, hostname, transactionId, policyId, policyScope, and policyScopeName.
Sources
- https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/waf-front-door-monitor
- https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/web-application-firewall-logs
- https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/application-gateway-waf-metrics
- https://www.hackerone.com/knowledge-center/what-is-azure-web-application-firewall
- https://www.educba.com/azure-waf/
Featured Images: pexels.com