Hello Ritika Laddha
To identify the special characters and strings blocked by Azure Front Door WAF policies you can check the below things.
- Azure Front Door WAF uses managed rule sets, such as the OWASP Core Rule Set (CRS). These rules are designed to detect and block common attack patterns, including SQL injection, cross-site scripting (XSS), and more. You can find details about these rules in the Azure documentation.
- You can also enable diagnostic logging for your WAF policy, and these logs will help in showing which rules were triggered and why, helping you identify blocked characters or patterns.
Refer this GitHub article: https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/web-application-firewall/afds/waf-front-door-tuning.md#understand-waf-logs
- If certain characters or strings are being blocked incorrectly, you can create custom rules or use exclusion lists to allow specific requests. Learn more about configuring exclusions here. Web application firewall exclusion lists in Azure Front Door | Microsoft Learn
NOTE: Azure Web Application Firewall (WAF) policies use predefined rule sets, such as the OWASP Core Rule Set (CRS), to block potentially malicious characters and strings. While there isn't a single predefined list of blocked characters and strings, the rules target patterns commonly associated with attacks like SQL injection, cross-site scripting (XSS), and command injection.
Please do consider to “up-vote” and "Accept the answer" wherever the information provided helps you, this can be beneficial to other community members.