Loading...

Detect traffic anomalies and auto-mitigate spikes with Azure WAF on Microsoft Azure Front Door

Detect traffic anomalies and auto-mitigate spikes with Azure WAF on Microsoft Azure Front Door

Introduction

Azure WAF on Microsoft Azure Front Door provides a centralized protection solution for your web applications. WAF includes built-in rules to defend against common exploits and vulnerabilities, and custom rules so you can tailor the protection to your specific needs.

Challenge
A popular use-case for custom rules is to rate limit Front Door traffic based on the Country or IP address range. However, configuring the rate limit threshold can sometimes be tricky due to varying traffic patterns based on the time of the day or the day of the week. For example, a rate limit rule created to protect against traffic spikes on a weekend (when the traffic volume is lower) may not fire on a weekday because what's a spike on a weekend might be the usual traffic volume for a weekday.

 

Solution

It involves two main steps:

  1. Detect anomalous spikes in traffic
  2. Automatically add Azure WAF rules to filter out the traffic causing the spike

 

In the deep-dive video that follows, we do a step-by-step walkthrough of how to perform these steps. The video is structured as follows:

 

- Introduction

  • What anomaly detection is.
  • What anomaly detection tools are available in Azure.

- Defining the problem statement

  • An overview of the challenge and issue we are trying to solve.

- Exploring the architecture diagram

  • An overview of the various components of the system and how they come together to solve the problem.

- Seeing it in action

  • Setup:
    1. Create a WAF policy
    2. Create a Microsoft Azure Front Door
    3. Link it to the WAF policy we created in Step (1)
    4. Define a dynamic threshold alert on the Azure Front Door endpoint
    5. Create an Azure Function that would run when the alert fires
  • Demo:
    • Simulate a DDOS (distributed denial of service) attack
    • Demonstrate that the attack has started
    • Wait for the alert to fire
    • Demonstrate that Azure WAF rules to mitigate the attack get auto-generated
    • Demonstrate the attack is mitigated after the Azure WAF rules are deployed to the edge

 

You can find the reference code here.

 

 

 

 

Published on:

Learn more
Azure Network Security Blog articles
Azure Network Security Blog articles

Azure Network Security Blog articles

Share post:

Related posts

Integration Testing Azure Functions with Reqnroll and C#, Part 5 - Using Corvus.Testing.ReqnRoll in a build pipeline

If you use Azure Functions on a regular basis, you'll likely have grappled with the challenge of testing them. In the final post in this serie...

2 days ago

Integration Testing Azure Functions with Reqnroll and C#, Part 4 - Controlling your functions with additional configuration

If you use Azure Functions on a regular basis, you'll likely have grappled with the challenge of testing them. In the fourth of this series of...

2 days ago

Integration Testing Azure Functions with Reqnroll and C#, Part 3 - Using hooks to start Functions

If you use Azure Functions on a regular basis, you'll likely have grappled with the challenge of testing them. In the third of a series of pos...

2 days ago

Integration Testing Azure Functions with Reqnroll and C#, Part 2 - Using step bindings to start Functions

If you use Azure Functions on a regular basis, you'll likely have grappled with the challenge of testing them. In the second of a series of po...

2 days ago

Integration Testing Azure Functions with Reqnroll and C#, Part 1 - Introduction

If you use Azure Functions on a regular basis, you'll likely have grappled with the challenge of testing them. In the first of a series of pos...

2 days ago

Announcing Azure MCP Server 2.0 Stable Release for Self-Hosted Agentic Cloud Automation

Azure MCP Server 2.0 is now generally available, delivering first-class self-hosting, stronger security hardening, and a faster foundation for...

3 days ago

Azure Security: Private Vs. Service Endpoints

When connecting securely to a platform service such as a key vault or an Azure storage account, Microsoft recommends using a private endpoint ...

3 days ago

Give your Foundry Agent Custom Tools with MCP Servers on Azure Functions

Learn how to connect your MCP server hosted on Azure Functions to Microsoft Foundry agents. This post covers authentication options and setup ...

5 days ago

Azure Data Factory Tips for Reliable Microsoft Dynamics 365 CE and Dataverse Integrations

Reliable integrations between Microsoft Dynamics 365 Customer Engagement and external systems can become challenging. This is especially true ...

5 days ago

Scalable AI with Azure Cosmos DB: Tredence Intelligent Document Processing (IDP) | March 2026

Azure Cosmos DB enables scalable AI-driven document processing, addressing one of the biggest barriers to operational scale in today’s enterpr...

6 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy