This will deploy 2 application gateways, a web app, a SQL server and database, OMS and other network resources. One app gateway is in detection mode and other is in prevention mode. Perform the SQL injection attack by following the guidleines and execute the scenario for mitigation and prevention of a SQL injection attack.
This Azure Resource Manager template was created by a member of the community and not by Microsoft. Each Resource Manager template is licensed to you under a license agreement by its owner, not Microsoft. Microsoft is not responsible for Resource Manager templates provided and licensed by community members and does not screen for security, compatibility, or performance. Community Resource Manager templates are not supported under any Microsoft support program or service, and are made available AS IS without warranty of any kind.
|_artifactsLocation||this will be the location for artifacts|
|_artifactsLocationSasToken||this will be the sas key to access artifacts|
|location||your resources will be created in this location|
|omsSku||this will be you SKU for OMS|
|pipAddressType||this will be the type of public IP address used for the VM name|
|sqlAdministratorName||this will be the admin user for sql server|
|sqlServerPassword||this will be the password for the admin user of sql server|
|emailToSendAlertsTo||this user will get the alert emails|
Use the template
New-AzureRmResourceGroupDeployment -Name <deployment-name> -ResourceGroupName <resource-group-name> -TemplateUri https://raw.githubusercontent.com/azure/azure-quickstart-templates/master/101-sql-injection-attack-prevention/azuredeploy.jsonInstall and configure Azure PowerShell
azure config mode arm azure group deployment create <my-resource-group> <my-deployment-name> --template-uri https://raw.githubusercontent.com/azure/azure-quickstart-templates/master/101-sql-injection-attack-prevention/azuredeploy.jsonInstall and Configure the Azure Cross-Platform Command-Line Interface