Application Gateway WAF - XSS Detection

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Identifies a match for XSS attack in the Application gateway WAF logs. The Threshold value in the query can be changed as per your infrastructure's requirement. References: https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID d2bc08fa-030a-4eea-931a-762d27c6a042
Severity High
Kind Scheduled
Tactics InitialAccess, Execution
Techniques T1189, T1203, T0853
Required Connectors WAF
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AzureDiagnostics 🔶 Category == "ApplicationGatewayFirewallLog" ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules