Skip to content

Commit 60f850a

Browse files
committed
add 2.1 disabled rules
1 parent 961d43b commit 60f850a

File tree

1 file changed

+29
-1
lines changed

1 file changed

+29
-1
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: web-application-firewall
55
author: vhorne
66
ms.author: victorh
77
ms.topic: conceptual
8-
ms.date: 09/27/2022
8+
ms.date: 10/13/2022
99
---
1010

1111
# Web Application Firewall DRS rule groups and rules
@@ -90,6 +90,34 @@ DRS 2.1 includes 17 rule groups, as shown in the following table. Each group con
9090
|**[MS-ThreatIntel-SQLI](#drs99031-21)**|Protect against SQLI attacks|
9191
|**[MS-ThreatIntel-CVEs](#drs99001-21)**|Protect against CVE attacks|
9292

93+
#### Disabled rules
94+
95+
The following rules are disabled by default for DRS 2.1:
96+
97+
98+
|Rule ID |Rule Group|Description |Why disabled|
99+
|---------|---------|---------|---------|
100+
|932200 |LFI|RCE Bypass Technique |Missing MATCHED_VAR support in FDv2/Roxy|
101+
|942130 |SQLI |SQL Injection Attack: SQL Tautology Detected |Not supported by Regex engine |
102+
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Replaced by MSTIC rule 99031001 |
103+
|942150 |SQLI|SQL Injection Attack|Replaced by MSTIC rule 99031003 |
104+
|942260 |SQLI|Detects basic SQL authentication bypass attempts 2/3 |Replaced by MSTIC rule 99031004 |
105+
|942430 |SQLI|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Too many false positives.|
106+
|942440 |SQLI|SQL Comment Sequence Detected|Replaced by MSTIC rule 99031002 |
107+
|920380 |PROTOCOL-ENFORCEMENT |Too many arguments in request |Requires customer input to specify request limits |
108+
|920360 |PROTOCOL-ENFORCEMENT|Argument name too long |Requires customer input to specify request limits|
109+
|920370 |PROTOCOL-ENFORCEMENT|Argument name too long|Requires customer input to specify request limits|
110+
|920390 |PROTOCOL-932200 ENFORCEMENT |Total arguments size exceeded |Requires customer input to specify request limits|
111+
|920400 |PROTOCOL-ENFORCEMENT|Uploaded file size too large |Requires customer input to specify request limits |
112+
|920410 |PROTOCOL-ENFORCEMENT|Total uploaded files size too large |Requires customer input to specify request limits |
113+
|920250 |PROTOCOL-ENFORCEMENT|UTF8 Encoding Abuse Attack Attempt |Disabled by default in CRS |
114+
|913102 |SCANNER-DETECTION |Found User-Agent associated with web crawler/bot |To be integrated into Bot Manager ruleset |
115+
|913101 |SCANNER-DETECTION |Found User-Agent associated with scripting/generic HTTP client |To be integrated into Bot Manager ruleset |
116+
|913120 |SCANNER-DETECTION |Found request filename/argument associated with security scanner |To be integrated into Bot Manager ruleset |
117+
|913110 |SCANNER-DETECTION |Found request header associated with security scanner |To be integrated into Bot Manager ruleset |
118+
|913100 |SCANNER-DETECTION |Found User-Agent associated with security scanner |To be integrated into Bot Manager ruleset |
119+
120+
93121
### DRS 2.0
94122

95123
DRS 2.0 rules offer better protection than earlier versions of the DRS. It also supports transformations beyond just URL decoding.

0 commit comments

Comments
 (0)