az network front-door waf-policy managed-rules
Note
This reference is part of the front-door extension for the Azure CLI (version 2.57.0 or higher). The extension will automatically install the first time you run an az network front-door waf-policy managed-rules command. Learn more about extensions.
Change and view managed rule sets associated with your WAF policy.
Commands
Name | Description | Type | Status |
---|---|---|---|
az network front-door waf-policy managed-rules add |
Add a managed rule set to a WAF policy. |
Extension | GA |
az network front-door waf-policy managed-rules exclusion |
View and alter exclusions on a managed rule set, rule group, or rule within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules exclusion add |
Add an exclusion on a managed rule set, rule group, or rule within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules exclusion list |
List the exclusions on managed rule set, rule group, or rule within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules exclusion remove |
Remove an exclusion on a managed rule set, rule group, or rule within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules list |
Show which managed rule sets are applied to a WAF policy. |
Extension | GA |
az network front-door waf-policy managed-rules override |
View and alter overrides on managed rules within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules override add |
Add an override on a managed rule within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules override list |
List the overrides on managed rules within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules override remove |
Remove an override on a managed rule within a managed rule set. |
Extension | GA |
az network front-door waf-policy managed-rules remove |
Remove a managed rule set from a WAF policy. |
Extension | GA |
az network front-door waf-policy managed-rules add
Add a managed rule set to a WAF policy.
Use 'az network front-door waf-policy managed-rule-definition list' to see the available managed rulesets.
az network front-door waf-policy managed-rules add --type
--version
[--action {Block, Log, Redirect}]
[--ids]
[--policy-name]
[--resource-group]
[--subscription]
Required Parameters
Ruleset type to use.
Rule set version.
Optional Parameters
Action for applied rulesets, only required for Microsoft_DefaultRuleSet with version 2.0 or higher.
One or more resource IDs (space-delimited). It should be a complete resource ID containing all information of 'Resource Id' arguments. You should provide either --ids or other 'Resource Id' arguments.
Name of the WAF policy. Name must begin with a letter and contain only letters and numbers.
Name of resource group. You can configure the default group using az configure --defaults group=<name>
.
Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID
.
Global Parameters
Increase logging verbosity to show all debug logs.
Show this help message and exit.
Only show errors, suppressing warnings.
Output format.
JMESPath query string. See http://jmespath.org/ for more information and examples.
Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID
.
Increase logging verbosity. Use --debug for full debug logs.
az network front-door waf-policy managed-rules list
Show which managed rule sets are applied to a WAF policy.
az network front-door waf-policy managed-rules list --policy-name
--resource-group
Required Parameters
Name of the WAF policy. Name must begin with a letter and contain only letters and numbers.
Name of resource group. You can configure the default group using az configure --defaults group=<name>
.
Global Parameters
Increase logging verbosity to show all debug logs.
Show this help message and exit.
Only show errors, suppressing warnings.
Output format.
JMESPath query string. See http://jmespath.org/ for more information and examples.
Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID
.
Increase logging verbosity. Use --debug for full debug logs.
az network front-door waf-policy managed-rules remove
Remove a managed rule set from a WAF policy.
az network front-door waf-policy managed-rules remove --type
[--ids]
[--policy-name]
[--resource-group]
[--subscription]
Required Parameters
ID of the ruleset to remove.
Optional Parameters
One or more resource IDs (space-delimited). It should be a complete resource ID containing all information of 'Resource Id' arguments. You should provide either --ids or other 'Resource Id' arguments.
Name of the WAF policy. Name must begin with a letter and contain only letters and numbers.
Name of resource group. You can configure the default group using az configure --defaults group=<name>
.
Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID
.
Global Parameters
Increase logging verbosity to show all debug logs.
Show this help message and exit.
Only show errors, suppressing warnings.
Output format.
JMESPath query string. See http://jmespath.org/ for more information and examples.
Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID
.
Increase logging verbosity. Use --debug for full debug logs.