Detect traffic anomalies and auto-mitigate spikes with Azure WAF on Microsoft Azure Front Door
Introduction
Azure WAF on Microsoft Azure Front Door provides a centralized protection solution for your web applications. WAF includes built-in rules to defend against common exploits and vulnerabilities, and custom rules so you can tailor the protection to your specific needs.
Challenge
A popular use-case for custom rules is to rate limit Front Door traffic based on the Country or IP address range. However, configuring the rate limit threshold can sometimes be tricky due to varying traffic patterns based on the time of the day or the day of the week. For example, a rate limit rule created to protect against traffic spikes on a weekend (when the traffic volume is lower) may not fire on a weekday because what's a spike on a weekend might be the usual traffic volume for a weekday.
Solution
It involves two main steps:
- Detect anomalous spikes in traffic
- Automatically add Azure WAF rules to filter out the traffic causing the spike
In the deep-dive video that follows, we do a step-by-step walkthrough of how to perform these steps. The video is structured as follows:
- Introduction
- What anomaly detection is.
- What anomaly detection tools are available in Azure.
- Defining the problem statement
- An overview of the challenge and issue we are trying to solve.
- Exploring the architecture diagram
- An overview of the various components of the system and how they come together to solve the problem.
- Seeing it in action
- Setup:
- Create a WAF policy
- Create a Microsoft Azure Front Door
- Link it to the WAF policy we created in Step (1)
- Define a dynamic threshold alert on the Azure Front Door endpoint
- Create an Azure Function that would run when the alert fires
- Demo:
- Simulate a DDOS (distributed denial of service) attack
- Demonstrate that the attack has started
- Wait for the alert to fire
- Demonstrate that Azure WAF rules to mitigate the attack get auto-generated
- Demonstrate the attack is mitigated after the Azure WAF rules are deployed to the edge
You can find the reference code here.
Published on:
Learn moreRelated posts
Azure MCP Server now available as an MCP Bundle (.mcpb)
Azure MCP Server is now available as an MCP Bundle (.mcpb), enabling one-click installation into Claude Desktop and other MCP-compatible clien...
7 tips to optimize Azure Cosmos DB costs for AI and agentic workloads
AI apps and agentic workloads expose inefficiencies in your data layer faster than any previous generation of apps. You’re storing embeddings,...
Public Preview: Actual Result for Manual Tests in Azure Test Plans
We’re excited to announce the public preview of the highly anticipated Actual Result (AR) feature for manual testing in Azure Test Plans...
Azure SDK Release (April 2026)
Azure SDK releases every month. In this post, you'll find this month's highlights and release notes. The post Azure SDK Release (April 2026) a...
General Availability: Dynamic Data Masking for Azure Cosmos DB
Protecting sensitive data is a foundational requirement for modern applications. As organizations scale their use of Azure Cosmos DB across te...
Azure DevOps MCP Server April Update
This update brings a set of improvements and changes across both local and remote Azure DevOps MCP Servers. Here’s a summary of what’s changed...