Skip to content

Commit 27aabc5

Browse files
committed
tweaks
1 parent e608cd6 commit 27aabc5

File tree

1 file changed

+7
-10
lines changed

1 file changed

+7
-10
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ You can disable rules individually, or set specific actions for each rule. This
2121
> When you change a ruleset version in a WAF Policy, any existing customizations you made to your ruleset will be reset to the defaults for the new ruleset. See: [Upgrading or changing ruleset version](#upgrading-or-changing-ruleset-version).
2222
2323
## Default rule set 2.1
24-
DRS 2.1 is baselined off the Open Web Application Security Project (OWASP) Core Rule Set (CRS) 3.3.2 and includes additional proprietary protections rules developed by Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.
24+
25+
Default rule set (DRS) 2.1 is baselined off the Open Web Application Security Project (OWASP) Core Rule Set (CRS) 3.3.2 and includes additional proprietary protections rules developed by Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.
2526

2627
DRS 2.1 offers a new engine and new rule sets defending against Java injections, an initial set of file upload checks, and fewer false positives compared with CRS versions. You can also [customize rules to suit your needs](application-gateway-customize-waf-rules-portal.md). Learn more about the new [Azure WAF engine](waf-engine.md).
2728

@@ -53,18 +54,17 @@ Use the following guidance to tune WAF while you get started with DRS 2.1 on App
5354

5455
|Rule ID |Rule Group|Description |Recommendation|
5556
|---------|---------|---------|---------|
56-
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Disable rule #942110, replaced by MSTIC rule 99031001 |
57-
|942150 |SQLI|SQL Injection Attack|Disable rule #942150, replaced by MSTIC rule 99031003 |
58-
|942260 |SQLI|Detects basic SQL authentication bypass attempts 2/3 |Disable rule #942260, replaced by MSTIC rule 99031004 |
59-
|942430 |SQLI|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Disable rule #942430, it triggers too many false positives|
60-
|942440 |SQLI|SQL Comment Sequence Detected|Disable rule #942440, replaced by MSTIC rule 99031002 |
57+
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Disable rule 942110, replaced by MSTIC rule 99031001 |
58+
|942150 |SQLI|SQL Injection Attack|Disable rule 942150, replaced by MSTIC rule 99031003 |
59+
|942260 |SQLI|Detects basic SQL authentication bypass attempts 2/3 |Disable rule 942260, replaced by MSTIC rule 99031004 |
60+
|942430 |SQLI|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Disable rule 942430, it triggers too many false positives|
61+
|942440 |SQLI|SQL Comment Sequence Detected|Disable rule 942440, replaced by MSTIC rule 99031002 |
6162
|99005006|MS-ThreatIntel-WebShells|Spring4Shell Interaction Attempt|Keep the rule enabled to prevent against SpringShell vulnerability|
6263
|99001014|MS-ThreatIntel-CVEs|Attempted Spring Cloud routing-expression injection [CVE-2022-22963](https://www.cve.org/CVERecord?id=CVE-2022-22963)|Keep the rule enabled to prevent against SpringShell vulnerability|
6364
|99001015|MS-ThreatIntel-WebShells|Attempted Spring Framework unsafe class object exploitation [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|Keep the rule enabled to prevent against SpringShell vulnerability|
6465
|99001016|MS-ThreatIntel-WebShells|Attempted Spring Cloud Gateway Actuator injection [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)|Keep the rule enabled to prevent against SpringShell vulnerability|
6566
|99001017|MS-ThreatIntel-CVEs|Attempted Apache Struts file upload exploitation [CVE-2023-50164](https://www.cve.org/CVERecord?id=CVE-2023-50164)|Set action to Block to prevent against Apache Struts vulnerability. Anomaly Score not supported for this rule|
6667

67-
6868
## Core rule set 3.2
6969

7070
The recommended managed rule set is the Default Rule Set 2.1, which is baselined off the Open Web Application Security Project (OWASP) Core Rule Set (CRS) 3.3.2 and includes additional proprietary protections rules developed by Microsoft Threat Intelligence team and updates to signatures to reduce false positives. As an alternative to DRS 2.1, you can use CRS 3.2 which is based off OWASP CRS 3.2.0 version.
@@ -879,7 +879,6 @@ The following rule groups and rules are available when using Web Application Fir
879879
|941340|IE XSS Filters - Attack Detected|
880880
|941350|UTF-7 Encoding IE XSS - Attack Detected|
881881

882-
883882
### <a name="crs942-31"></a> REQUEST-942-APPLICATION-ATTACK-SQLI
884883

885884
|RuleId|Description|
@@ -1039,14 +1038,12 @@ The following rule groups and rules are no longer supported on Web Application F
10391038
|800112|Attempted Spring Framework unsafe class object exploitation - [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|
10401039
|800113|Attempted Spring Cloud Gateway Actuator injection - [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)|
10411040

1042-
10431041
### <a name="crs911-30"></a> REQUEST-911-METHOD-ENFORCEMENT
10441042

10451043
|RuleId|Description|
10461044
|---|---|
10471045
|911100|Method isn't allowed by policy|
10481046

1049-
10501047
### <a name="crs913-30"></a> REQUEST-913-SCANNER-DETECTION
10511048

10521049
|RuleId|Description|

0 commit comments

Comments
 (0)