We are using Azure Web Application Firewall to filter and analyze requests from the end-user part of our application. It also processes requests from browsers to the backend of our application, ensuring that suspicious requests are blocked.
Azure Web Application Firewall is basically used as a firewall for your web application. So when we create a web application, for instance, if there is a continuous integration and continuous data is being sent from on-premise to the cloud, or the users are hitting some URLs. First, it goes through Azure Web Application Firewall, where you define the different rules, different routing rules, and routing mechanisms and allow or block different users.
Learn what your peers think about Azure Web Application Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
Azure Principal Architect at Cloud Computech Consultancy
Real User
Top 5
2023-05-04T19:10:00Z
May 4, 2023
We use the solution to protect our web applications. It is important to protect web applications from the core, such as SQL injection. We can leverage the built-in Microsoft application, such as Defender, to do this. Application firewalls offer many benefits.
Senior Specialist - Azure Cloud at HCL Technologies Ltd
Real User
2022-11-16T10:50:35Z
Nov 16, 2022
We are using the solution for filtering the web application traffic. It's based on the matrix configured by the application server. That traffic will be filtered based on incoming traffic. It'll transfer the outgoing traffic to the endpoint.
Our primary use cases of this solution are mainly for UPII, DDoS phishing and spam. This is the first VAP solution that I've used. I'm group CIO and we are customers of Azure.
Azure Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. SQL injection and cross-site scripting are among the most common attacks.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
I mainly use it for front-facing applications and maintenance work. These are the main applications that I use.
I use it in combination with other things like endpoint security and application security, along with RBAC.
We are using Azure Web Application Firewall to filter and analyze requests from the end-user part of our application. It also processes requests from browsers to the backend of our application, ensuring that suspicious requests are blocked.
We primarily use the solution for cloud security.
I use the solution as an internal dashboard app for internal customers. We use its different automation features.
Azure Web Application Firewall is basically used as a firewall for your web application. So when we create a web application, for instance, if there is a continuous integration and continuous data is being sent from on-premise to the cloud, or the users are hitting some URLs. First, it goes through Azure Web Application Firewall, where you define the different rules, different routing rules, and routing mechanisms and allow or block different users.
We use the solution to protect our web applications. It is important to protect web applications from the core, such as SQL injection. We can leverage the built-in Microsoft application, such as Defender, to do this. Application firewalls offer many benefits.
I'm doing a demo of Azure Web Application Firewall for layer 7 protection of the tools I offer to my e-commerce customers.
We are using the solution for filtering the web application traffic. It's based on the matrix configured by the application server. That traffic will be filtered based on incoming traffic. It'll transfer the outgoing traffic to the endpoint.
Our primary use cases of this solution are mainly for UPII, DDoS phishing and spam. This is the first VAP solution that I've used. I'm group CIO and we are customers of Azure.
Our primary use case is to protect the service from outside, as well as for our connectivity within the branches.