Skip to content

Commit 30610ca

Browse files
Merge pull request #236249 from ZarrVenkat/DRS-2.1-minor-new
Drs 2.1 minor new
2 parents 6084a36 + 646b4a5 commit 30610ca

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/web-application-firewall/ag/application-gateway-waf-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,11 @@ My-Header: 1=1
5757
The value of the header (`1=1`) might be detected as an attack by the WAF. But if you know this is a legitimate value for your scenario, you can configure an exclusion for the *value* of the header. To do so, you use the **RequestHeaderValues** match variable, the operator **contains**, and the selector (`My-Header`).
5858

5959
> [!NOTE]
60-
> Request attributes by key and values are only available in CRS 3.2 or newer and Bot Manager 1.0 or newer.
60+
> Request attributes by key and values are only available in DRS 2.1 / CRS 3.2 or newer and Bot Manager 1.0 or newer.
6161
>
6262
> Request attributes by names work the same way as request attributes by values, and are included for backward compatibility with CRS 3.1 and earlier versions. We recommend you use request attributes by values instead of attributes by names. For example, use **RequestHeaderValues** instead of **RequestHeaderNames**.
6363
64-
In contrast, if your WAF detects the header's name (`My-Header`) as an attack, you could configure an exclusion for the header *key* by using the **RequestHeaderKeys** request attribute. The **RequestHeaderKeys** attribute is only available in CRS 3.2 or newer and Bot Manager 1.0 or newer.
64+
In contrast, if your WAF detects the header's name (`My-Header`) as an attack, you could configure an exclusion for the header *key* by using the **RequestHeaderKeys** request attribute. The **RequestHeaderKeys** attribute is only available in DRS 2.1 / CRS 3.2 or newer and Bot Manager 1.0 or newer.
6565

6666
## Exclusion scopes
6767

@@ -74,7 +74,7 @@ Exclusions can be configured to apply to a specific set of WAF rules, to ruleset
7474

7575
You can configure an exclusion for a specific rule, group of rules, or rule set. You must specify the rule or rules that the exclusion applies to. You also need to specify the request attribute that should be excluded from the WAF evaluation. To exclude a complete group of rules, only provide the `ruleGroupName` parameter, the `rules` parameter is only useful when you want to limit the exclusion to specific rules of a group.
7676

77-
Per-rule exclusions are available when you use the OWASP (CRS) ruleset version 3.2 or later or Bot Manager ruleset version 1.0 or later.
77+
Per-rule exclusions are available when you use the DRS ruleset versions 2.1 / OWASP (CRS) ruleset version 3.2 or later or Bot Manager ruleset version 1.0 or later.
7878

7979
#### Example
8080

articles/web-application-firewall/ag/application-gateway-waf-request-size-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The following two size limits configurations are available:
2828

2929
The default value for file upload limit is 100 MB.
3030

31-
For CRS 3.2 (on the WAF_v2 SKU) and newer, these limits are as follows when using a WAF policy for Application Gateway:
31+
For DRS 2.1 / CRS 3.2 (on the WAF_v2 SKU) and newer, these limits are as follows when using a WAF policy for Application Gateway:
3232

3333
- 2 MB request body size limit
3434
- 4 GB file upload limit

articles/web-application-firewall/ag/custom-waf-rules-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: devx-track-azurepowershell
1212

1313
# Custom rules for Web Application Firewall v2 on Azure Application Gateway
1414

15-
The Azure Application Gateway Web Application Firewall (WAF) v2 comes with a pre-configured, platform-managed ruleset that offers protection from many different types of attacks. These attacks include cross site scripting, SQL injection, and others. If you're a WAF admin, you may want to write your own rules to augment the core rule set (CRS) rules. Your custom rules can either block, allow, or log requested traffic based on matching criteria. If the WAF policy is set to detection mode, and a custom block rule is triggered, the request is logged and no blocking action is taken.
15+
The Azure Application Gateway Web Application Firewall (WAF) v2 comes with a pre-configured, platform-managed ruleset that offers protection from many different types of attacks. These attacks include cross site scripting, SQL injection, and others. If you're a WAF admin, you may want to write your own rules to augment the default rule set(DRS) / core rule set (CRS) rules. Your custom rules can either block, allow, or log requested traffic based on matching criteria. If the WAF policy is set to detection mode, and a custom block rule is triggered, the request is logged and no blocking action is taken.
1616

1717
Custom rules allow you to create your own rules that are evaluated for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. The custom rules contain a rule name, rule priority, and an array of matching conditions. If these conditions are met, an action is taken (to allow, block, or log). If a custom rule is triggered, and an allow or block action is taken, no further custom or managed rules are evaluated. Custom rules can be enabled/disabled on demand.
1818

@@ -116,10 +116,10 @@ Must be one of the variables:
116116
- RemoteAddr – IPv4 Address/Range of the remote computer connection
117117
- RequestMethod – HTTP Request method
118118
- QueryString – Variable in the URI
119-
- PostArgs – Arguments sent in the POST body. Custom Rules using this match variable are only applied if the 'Content-Type' header is set to 'application/x-www-form-urlencoded' and 'multipart/form-data'. Additional content type of `application/json` is supported with CRS version 3.2 or greater, bot protection rule set, and geo-match custom rules.
119+
- PostArgs – Arguments sent in the POST body. Custom Rules using this match variable are only applied if the 'Content-Type' header is set to 'application/x-www-form-urlencoded' and 'multipart/form-data'. Additional content type of `application/json` is supported with DRS version 2.1 / CRS version 3.2 or greater, bot protection rule set, and geo-match custom rules.
120120
- RequestUri – URI of the request
121121
- RequestHeaders – Headers of the request
122-
- RequestBody – This contains the entire request body as a whole. Custom rules using this match variable are only applied if the 'Content-Type' header is set to `application/x-www-form-urlencoded` media type. Additional content types of `application/soap+xml, application/xml, text/xml` are supported with CRS version 3.2 or greater, bot protection rule set, and geo-match custom rules.
122+
- RequestBody – This contains the entire request body as a whole. Custom rules using this match variable are only applied if the 'Content-Type' header is set to `application/x-www-form-urlencoded` media type. Additional content types of `application/soap+xml, application/xml, text/xml` are supported with DRS version 2.1 / CRS version 3.2 or greater, bot protection rule set, and geo-match custom rules.
123123
- RequestCookies – Cookies of the request
124124

125125
### Selector [optional]

0 commit comments

Comments
 (0)