You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Web Application Firewall DRS rule groups and rules
12
12
13
13
Azure Front Door web application firewall (WAF) protects web applications from common vulnerabilities and exploits. Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Since such rule sets are managed by Azure, the rules are updated as needed to protect against new attack signatures. Default rule set also includes the Microsoft Threat Intelligence Collection rules that are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
14
14
15
-
16
15
## Default rule sets
17
16
18
17
Azure-managed Default Rule Set includes rules against the following threat categories:
@@ -40,23 +39,26 @@ Custom rules are always applied before rules in the Default Rule Set are evaluat
40
39
41
40
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
42
41
43
-
### Anomaly Scoring mode
42
+
### Anomaly scoring mode
43
+
44
+
OWASP has two modes for deciding whether to block traffic: *traditional* mode and anomaly scoring* mode.
44
45
45
-
OWASP has two modes for deciding whether to block traffic: Traditional mode and Anomaly Scoring mode.
46
+
In the traditional mode, traffic that matches any rule is considered independently of any other rule matches. This mode is easy to understand. But the lack of information about how many rules match a specific request is a limitation.
46
47
47
-
In Traditional mode, traffic that matches any rule is considered independently of any other rule matches. This mode is easy to understand. But the lack of information about how many rules match a specific request is a limitation. So, Anomaly Scoring mode was introduced. It's the default for OWASP 3.*x*.
48
+
The anomaly scoring mode was introduced in the OWASP 3.*x* rule sets, and it's the default mode. Traffic that matches any rule isn't immediately blocked when the firewall is in Prevention mode. Rules have a severity: *Critical*, *Error*, *Warning*, or *Notice*. The severity affects a numeric value for the request, which is called the *anomaly score*:
48
49
49
-
In Anomaly Scoring mode, traffic that matches any rule isn't immediately blocked when the firewall is in Prevention mode. Rules have a certain severity: *Critical*, *Error*, *Warning*, or *Notice*. That severity affects a numeric value for the request, which is called the Anomaly Score. For example, one *Warning* rule match contributes 3 to the score. One *Critical* rule match contributes 5.
50
+
| Severity | Contributes to anomaly score |
51
+
|-|-|
52
+
| Critical | 5 |
53
+
| Error | 4 |
54
+
| Warning | 3 |
55
+
| Notice | 2 |
50
56
51
-
|Severity |Value |
52
-
|---------|---------|
53
-
|Critical |5|
54
-
|Error |4|
55
-
|Warning |3|
56
-
|Notice |2|
57
+
If the anomaly score is 5 or greater, WAF blocks the request.
57
58
58
-
There's a threshold of 5 for the Anomaly Score to block traffic. So, a single *Critical* rule match is enough for the WAF to block a request, even in Prevention mode. But one *Warning* rule match only increases the Anomaly Score by 3, which isn't enough by itself to block the traffic. For more information, see [What content types does WAF support?](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ to learn what content types are supported for body inspection with different DRS versions.
59
+
For example, a single *Critical* rule match is enough for the WAF to block a request, because the overall anomaly score is 5. However, one *Warning* rule match only increases the anomaly score by 3, which isn't enough by itself to block the traffic.
59
60
61
+
For information about which content types are supported for body inspection with different DRS versions, see [What content types does WAF support?](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ.
60
62
61
63
### DRS 2.0
62
64
@@ -118,9 +120,6 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
118
120
|**[MS-ThreatIntel-WebShells](#drs9905-10)**|Protect against Web shell attacks|
119
121
|**[MS-ThreatIntel-CVEs](#drs99001-10)**|Protect against CVE attacks|
120
122
121
-
122
-
123
-
124
123
### Bot rules
125
124
126
125
|Rule group|Description|
@@ -129,10 +128,7 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
The following rule groups and rules are available when using Web Application Firewall on Azure
135
-
Front Door.
131
+
The following rule groups and rules are available when using Web Application Firewall on Azure Front Door.
136
132
137
133
# [DRS 2.0](#tab/drs20)
138
134
@@ -289,7 +285,6 @@ Front Door.
289
285
>[!NOTE]
290
286
> This article contains references to the term *blacklist*, a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
291
287
292
-
293
288
### <aname="drs942-20"></a> SQLI - SQL Injection
294
289
|RuleId|Description|
295
290
|---|---|
@@ -335,7 +330,6 @@ Front Door.
335
330
|942500|MySQL in-line comment detected.|
336
331
|942510|SQLi bypass attempt by ticks or backticks detected.|
337
332
338
-
339
333
### <aname="drs943-20"></a> SESSION-FIXATION
340
334
|RuleId|Description|
341
335
|---|---|
@@ -383,6 +377,13 @@ Front Door.
383
377
|99001015|Attempted Spring Framework unsafe class object exploitation [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|
384
378
|99001016|Attempted Spring Cloud Gateway Actuator injection [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)
385
379
380
+
> [!NOTE]
381
+
> When reviewing your WAF's logs, you might see rule ID 949110, which has a description of *Mandatory rule. Cannot be disabled. Inbound Anomaly Score Exceeded*.
382
+
>
383
+
> This rule indicates that the total anomaly score for the request exceeded the maximum allowable score. For more information, see [Anomaly scoring mode](#anomaly-scoring-mode).
384
+
>
385
+
> When you tune your WAF policies, you need to investigate the other rules that were triggered by the request so that you can adjust your WAF's configuration. For more information, see [Tuning Web Application Firewall (WAF) for Azure Front Door](waf-front-door-tuning.md).
@@ -271,6 +271,12 @@ Another way to view request and response headers is to look inside the developer
271
271
272
272
If the request contains cookies, the Cookies tab can be selected to view them in Fiddler. Cookie information can also be used to create exclusions or custom rules in WAF.
273
273
274
+
## Anomaly scoring rule
275
+
276
+
If you see rule ID 949110 during the process of tuning your WAF, this indicates that the request was blocked by the [anomaly scoring](waf-front-door-drs.md#anomaly-scoring-mode) process.
277
+
278
+
Review the other WAF log entries for the same request, by searching for the log entries with the same tracking reference. Look at each of the rules that were triggered, and tune each rule by following the guidance throughout this article.
279
+
274
280
## Next steps
275
281
276
282
- Learn about [Azure web application firewall](../overview.md).
0 commit comments