Hi @Rupesh Sonawane
Thanks for your response.
But again this will be a real challenge to easily identify the rules which could have contributed to the Rule trigger if they were set to anomalyscoring, through Log Analytics.
To answer your questions,here is the KQL query to check which requests are being blocked by anomalyscoring in the WAF policy.
AzureDiagnostics
| where Category =="ApplicationGatewayFirewallLog"
| where Message contains "Anomaly Score Exceeded"
| project TimeGenerated, Category,ruleId_s,Resource,Message,action_s
Output
Note: Block and Allow actions are available only for WAF Policy for Regional WAF (Application Gateway), not for Global WAF (Front Door).
Portal result of Regional WAF( Application Gateway)
I hope this helps to resolve your issue!
If this helps to resolve your query, please click Accept Answer on this post to assist other community members facing similar issues in finding the correct solution.