Loading...

Navigating Azure WAF Exclusions

Navigating Azure WAF Exclusions

Introduction

Exclusions in Azure WAF (Web Application Firewall) are a critical feature that allows administrators to fine-tune security rules by specifying elements that should not be evaluated by WAF rules. This capability is essential for reducing false positives and ensuring that legitimate traffic flows unimpeded. Exclusions are designed to fine-tune the WAF’s sensitivity, allowing legitimate traffic to pass through while maintaining robust security measures. They are particularly useful in scenarios where certain request attributes, such as specific cookie values or query strings, are known to be safe but might trigger WAF rules due to their content or structure.

 

Azure WAF Exclusions: A Closer Look

Azure WAF exclusions can be applied to a rule, set of rules, rule group, or globally for the entire ruleset. This flexibility is crucial for meeting application-specific requirements and reducing false positives. For instance, exclusions introduced with CRS 3.2 on regional WAF with Application Gateway now allow attribute exclusions definitions by name or value of header, cookies, and arguments.

 

Attributes for WAF exclusions

  • Attributes that can be excluded include:
    • Request headers
    • Request cookies
    • Query strings
    • Post args
    • JSON entity (only for AFD WAF)
  • Operators for exclusions include:
    • Equals: For exact matches.
    • Starts with: Matches fields starting with a specific selector value.
    • Ends with: Matches fields ending with a specified selector value.
    • Contains: Matches fields containing a specific selector value.
    • Equals any: Matches all request fields (useful when exact values are unknown).

 

Note: The “Equals Any” condition automatically converts any value you enter in the selector field to an asterisk (*) by the backend when creating an exclusion. This feature is especially valuable when handling unknown or random values.

 

  • Exclusions can be applied on:
    • Rule
    • Rule set
    • Rule group
    • Global

 

Azure Front Door WAF: Exclusion Example

Azure Front Door WAF allows for exclusions to be set at a detailed level, targeting the values of match variables like request headers, cookies, and query strings. This granularity ensures that only the necessary parts of a request are excluded from rule evaluation, reducing the likelihood of false positives without significantly impacting the overall security posture.

 

SaleemBseeu_1-1711806525954.png

 

When configuring Azure Web Application Firewall (WAF) to inspect JSON request bodies, it’s crucial to understand how to handle legitimate requests that might otherwise be flagged as potential threats. For instance, consider the following JSON request body:

 

JSON Example

{

  "posts": [

    {

      "eid": 1,

      "comment": ""

    },

    {

      "eid": 2,

      "comment": "\"1=1\""

    }

  ]

}

 

In this example, the "1=1" in the comment field could be mistaken by the WAF as a SQL injection attempt. However, if this pattern is a normal part of your application’s operation, you can create an exclusion to prevent false positives. By setting an exclusion with a match variable of Request body JSON args name, an operator of Equals, and a selector of posts.comment, you instruct the WAF to overlook the “comment” property when scanning for threats. To refine the exclusion and make it more specific, we have applied it solely to the ‘SQLI’ rule group and the ‘942150 SQL Injection Attack’ rule. This ensures that only this particular selector is exempt from inspection by this rule, while all other rules will continue to inspect it for any threats.

 

Note: JSON request bodies inspection For Azure Front Door WAF is available from DRS 2.0 or newer.

 

Application Gateway WAF: Exclusion Example

SaleemBseeu_2-1711806525964.png

 

For WAF on Application gateway we will use a different JSON example:

 

JSON Example

{

    "properties": {

        "credentials": {

            "emai.l=l": "admin",

            "password": "test"

        }

    }

}

 

In the previous example, we examined the value of the selector. However, in this case, our focus is on excluding the selector key itself, rather than excluding the value within the key. Above in the JSON example you can see “properties.credentials.emai.l=l” and  This specific key contains “l=l”, which could potentially trigger an SQL injection attack rule. To exclude this specific selector, we’ve created an exclusion rule matching the variable “Request Arg Keys” with the value “properties.credentials.emai.l=l”. This exclusion prevents further false positives.

 

This feature is available in Application Gateway WAF and only in CRS 3.2 or newer and Bot Manager 1.0 or newer. By excluding the key/selector itself, we significantly improve the tuning of WAF false positives. For more WAF Exclusion examples see here Web application firewall exclusion lists in Azure Application Gateway - Azure portal | Microsoft Learn

 

Furthermore, within Application Gateway WAF, you have the flexibility to selectively apply this exclusion to specific rules. In our scenario, we’ve opted to apply it to Rule 942130: SQL Injection Attack: SQL Tautology. This means that we’re excluding this particular key only for this specific rule, while still ensuring that the rest of the JSON is thoroughly inspected by the remaining ruleset

 

Note: Request attributes by names function similarly to request attributes by values and are included for backward compatibility with CRS 3.1 and earlier versions. However, we it’s recommended using request attributes by values instead of attributes by names. For instance, opt for RequestHeaderValues rather than RequestHeaderNames

 

This approach ensures that legitimate traffic is not inadvertently blocked, maintaining the flow of your application while still protecting against actual security risks. It’s a delicate balance between security and functionality, and exclusions are a powerful tool in the WAF’s arsenal to achieve this balance. Always verify the legitimacy of such patterns before creating exclusions to maintain the security posture of your application.

 

Match variable mapping.

When setting up exclusions, it can be challenging to map the Match variables you observe in your logs to the corresponding configuration on your Web Application Firewall (WAF). By referring to this table, you can streamline the exclusion process and ensure that your WAF is accurately tuned to your traffic.

 

Azure Application Gateway

MatchVars in Logs

MatchVars for Excl.

REQUEST_HEADERS_NAMES

Request Header Keys

REQUEST_HEADERS

Request Header Values/Names

REQUEST_COOKIES_NAMES

Request Cookie Keys

REQUEST_COOKIES

Request Cookie Values/Names

ARGS_NAMES

Request Arg Keys

ARGS

Request Arg Values/Names

ARGS_GET

Request Arg Values/Names

REQUEST_URI

Custom Rule

REQUEST_BODY

Request Arg Values/Names

REQUEST_BASENAME

Custom Rule (Part of URI)

MULTIPART_STRICT_ERROR

N/A

REQUEST_METHOD

N/A

REQUEST_PROTOCOL

N/A

Request_Filename

Custom

REQUEST_URI_RAW

Custom

XML

Custom

MULTIPART_STRICT_ERROR

N/A

 

 

Azure Front Door WAF

MatchVars in Logs

MatchVars for Excl.

HeaderValue

Request header name

CookieValue

Request cookie name

QueryParamValue

Query string args name

MultipartParamValue

Request body post args name

JsonValue

Request body JSON args name

URI

Custom Rule

InitialBodyContents*

Custom Rule

DecodedInitialBodyContents*

Custom Rule

 

 

Best Practices for Implementing Exclusions

When implementing exclusions, it’s crucial to follow a structured approach:

  1. Document Current Settings: Before making any changes, document all existing WAF settings, including rules and exclusions.
  2. Test in Staging: Apply and test exclusions in a non-production environment to ensure they work as intended without introducing new risks.
  3. Apply to Production: Once verified, apply the tested exclusions to the production environment, monitoring closely for any unexpected behavior.

 

Conclusion

Exclusions in Azure WAF, whether for Azure Front Door or Application Gateway, offer a nuanced approach to web application security. By understanding and utilizing these features, administrators can ensure that security measures are effective without disrupting legitimate user activity. As Azure WAF continues to evolve, the ability to fine-tune security through exclusions will remain a cornerstone of its effectiveness.

 

Resources

Published on:

Learn more
Azure Network Security Blog articles
Azure Network Security Blog articles

Azure Network Security Blog articles

Share post:

Related posts

Power Automate Custom Connector – Implement Retry Function, Azure Application Insights

Another journey on how to create a Power Automate Custom Connector with .NET API 8. Last week, we created a .NET API Project that implements t...

2 days ago

Azure SDK Release (November 2024)

The Azure SDKs release every month. This post includes the month's highlights and release notes. The post Azure SDK Release (November 2024) ap...

5 days ago

Azure Database for PostgreSQL Flexible Server - Elastic Clusters, faster disks, and AI updates

Increase scalability, optimize performance, and integrate advanced AI features with Azure Database for PostgreSQL Flexible Server. Scale up wi...

10 days ago

Introducing the new Linux-based Azure Cosmos DB Emulator (Preview)

We are excited to announce the preview release of the new Linux-based Azure Cosmos DB Emulator! This latest version is built to provide faster...

12 days ago

Azure Cosmos DB Shines at Microsoft Ignite 2024!

Microsoft Ignite 2024 took over the Windy City this week, bringing with it new technological innovation and exciting product announcements apl...

13 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy