@@ -5,7 +5,7 @@ ms.service: web-application-firewall
55author : vhorne
66ms.author : victorh
77ms.topic : conceptual
8- ms.date : 09/27 /2022
8+ ms.date : 10/13 /2022
99---
1010
1111# Web Application Firewall DRS rule groups and rules
@@ -90,6 +90,34 @@ DRS 2.1 includes 17 rule groups, as shown in the following table. Each group con
9090| ** [ MS-ThreatIntel-SQLI] ( #drs99031-21 ) ** | Protect against SQLI attacks|
9191| ** [ MS-ThreatIntel-CVEs] ( #drs99001-21 ) ** | Protect against CVE attacks|
9292
93+ #### Disabled rules
94+
95+ The following rules are disabled by default for DRS 2.1:
96+
97+
98+ | Rule ID | Rule Group| Description | Why disabled|
99+ | ---------| ---------| ---------| ---------|
100+ | 932200 | LFI| RCE Bypass Technique | Missing MATCHED_VAR support in FDv2/Roxy|
101+ | 942130 | SQLI | SQL Injection Attack: SQL Tautology Detected | Not supported by Regex engine |
102+ | 942110 | SQLI| SQL Injection Attack: Common Injection Testing Detected | Replaced by MSTIC rule 99031001 |
103+ | 942150 | SQLI| SQL Injection Attack| Replaced by MSTIC rule 99031003 |
104+ | 942260 | SQLI| Detects basic SQL authentication bypass attempts 2/3 | Replaced by MSTIC rule 99031004 |
105+ | 942430 | SQLI| Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)| Too many false positives.|
106+ | 942440 | SQLI| SQL Comment Sequence Detected| Replaced by MSTIC rule 99031002 |
107+ | 920380 | PROTOCOL-ENFORCEMENT | Too many arguments in request | Requires customer input to specify request limits |
108+ | 920360 | PROTOCOL-ENFORCEMENT| Argument name too long | Requires customer input to specify request limits|
109+ | 920370 | PROTOCOL-ENFORCEMENT| Argument name too long| Requires customer input to specify request limits|
110+ | 920390 | PROTOCOL-932200 ENFORCEMENT | Total arguments size exceeded | Requires customer input to specify request limits|
111+ | 920400 | PROTOCOL-ENFORCEMENT| Uploaded file size too large | Requires customer input to specify request limits |
112+ | 920410 | PROTOCOL-ENFORCEMENT| Total uploaded files size too large | Requires customer input to specify request limits |
113+ | 920250 | PROTOCOL-ENFORCEMENT| UTF8 Encoding Abuse Attack Attempt | Disabled by default in CRS |
114+ | 913102 | SCANNER-DETECTION | Found User-Agent associated with web crawler/bot | To be integrated into Bot Manager ruleset |
115+ | 913101 | SCANNER-DETECTION | Found User-Agent associated with scripting/generic HTTP client | To be integrated into Bot Manager ruleset |
116+ | 913120 | SCANNER-DETECTION | Found request filename/argument associated with security scanner | To be integrated into Bot Manager ruleset |
117+ | 913110 | SCANNER-DETECTION | Found request header associated with security scanner | To be integrated into Bot Manager ruleset |
118+ | 913100 | SCANNER-DETECTION | Found User-Agent associated with security scanner | To be integrated into Bot Manager ruleset |
119+
120+
93121### DRS 2.0
94122
95123DRS 2.0 rules offer better protection than earlier versions of the DRS. It also supports transformations beyond just URL decoding.
0 commit comments