|
2 | 2 | title: Azure Web Application Firewall DRS rule groups and rules
|
3 | 3 | description: This article provides information on Azure Web Application Firewall DRS rule groups and rules.
|
4 | 4 | ms.service: web-application-firewall
|
5 |
| -author: vhorne |
| 5 | +author: sowmyam2019 |
6 | 6 | ms.author: victorh
|
7 | 7 | ms.topic: conceptual
|
8 | 8 | ms.date: 05/30/2024
|
@@ -173,14 +173,26 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
|
173 | 173 | |[MS-ThreatIntel-WebShells](#drs9905-10)|MS-ThreatIntel-WebShells|Protect against Web shell attacks|
|
174 | 174 | |[MS-ThreatIntel-CVEs](#drs99001-10)|MS-ThreatIntel-CVEs|Protect against CVE attacks|
|
175 | 175 |
|
176 |
| -### Bot rules |
| 176 | +### Bot Manager 1.0 |
| 177 | + |
| 178 | +The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots. |
177 | 179 |
|
178 | 180 | |Rule group|Description|
|
179 | 181 | |---|---|
|
180 | 182 | |[BadBots](#bot100)|Protect against bad bots|
|
181 | 183 | |[GoodBots](#bot200)|Identify good bots|
|
182 | 184 | |[UnknownBots](#bot300)|Identify unknown bots|
|
183 | 185 |
|
| 186 | +### Bot Manager 1.1 |
| 187 | + |
| 188 | +The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection. |
| 189 | + |
| 190 | +|Rule group|Description| |
| 191 | +|---|---| |
| 192 | +|[BadBots](#bot11-100)|Protect against bad bots| |
| 193 | +|[GoodBots](#bot11-200)|Identify good bots| |
| 194 | +|[UnknownBots](#bot11-300)|Identify unknown bots| |
| 195 | + |
184 | 196 | The following rule groups and rules are available when you use Azure Web Application Firewall on Azure Front Door.
|
185 | 197 |
|
186 | 198 | # [DRS 2.1](#tab/drs21)
|
@@ -1050,9 +1062,9 @@ The following rule groups and rules are available when you use Azure Web Applica
|
1050 | 1062 | |99001016|Attempted Spring Cloud Gateway Actuator injection [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)|
|
1051 | 1063 | |99001017|Attempted Apache Struts file upload exploitation [CVE-2023-50164](https://www.cve.org/CVERecord?id=CVE-2023-50164)|
|
1052 | 1064 |
|
1053 |
| -# [Bot rules](#tab/bot) |
| 1065 | +# [Bot Manager 1.0](#tab/bot) |
1054 | 1066 |
|
1055 |
| -## <a name="bot"></a> Bot manager rule sets |
| 1067 | +## <a name="bot"></a> 1.0 rule sets |
1056 | 1068 |
|
1057 | 1069 | ### <a name="bot100"></a> Bad bots
|
1058 | 1070 | |RuleId|Description|
|
@@ -1081,6 +1093,43 @@ The following rule groups and rules are available when you use Azure Web Applica
|
1081 | 1093 |
|
1082 | 1094 | Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header.
|
1083 | 1095 |
|
| 1096 | +# [Bot Manager 1.1](#tab/bot11) |
| 1097 | + |
| 1098 | +## <a name="bot11"></a> 1.1 rule sets |
| 1099 | + |
| 1100 | +### <a name="bot11-100"></a> Bad bots |
| 1101 | +|RuleId|Description| |
| 1102 | +|---|---| |
| 1103 | +|Bot100100|Malicious bots detected by threat intelligence| |
| 1104 | +|Bot100200|Malicious bots that have falsified their identity| |
| 1105 | +|Bot100300|High risk bots detected by threat intelligence| |
| 1106 | + |
| 1107 | + Bot100100 scans both client IP addresses and IPs in the `X-Forwarded-For` header. |
| 1108 | + |
| 1109 | +### <a name="bot11-200"></a> Good bots |
| 1110 | +|RuleId|Description| |
| 1111 | +|---|---| |
| 1112 | +|Bot200100|Search engine crawlers| |
| 1113 | +|Bot200200|Verified miscellaneous bots| |
| 1114 | +|Bot200300|Verified link checker bots| |
| 1115 | +|Bot200400|Verified social media bots| |
| 1116 | +|Bot200500|Verified content fetchers| |
| 1117 | +|Bot200600|Verified feed fetchers| |
| 1118 | +|Bot200700|Verified advertising bots| |
| 1119 | + |
| 1120 | +### <a name="bot11-300"></a> Unknown bots |
| 1121 | +|RuleId|Description| |
| 1122 | +|---|---| |
| 1123 | +|Bot300100|Unspecified identity| |
| 1124 | +|Bot300200|Tools and frameworks for web crawling and attacks| |
| 1125 | +|Bot300300|General-purpose HTTP clients and SDKs| |
| 1126 | +|Bot300400|Service agents| |
| 1127 | +|Bot300500|Site health monitoring services| |
| 1128 | +|Bot300600|Unknown bots detected by threat intelligence. This rule also includes IP addresses matched to the Tor network.| |
| 1129 | +|Bot300700|Other bots| |
| 1130 | + |
| 1131 | +Bot300600 scans both client IP addresses and IPs in the `X-Forwarded-For` header. |
| 1132 | + |
1084 | 1133 | ---
|
1085 | 1134 |
|
1086 | 1135 | ## Next steps
|
|
0 commit comments