Skip to content

Commit 6ac27b2

Browse files
committed
Update 2.1 disabled rules table
1 parent 1521dc0 commit 6ac27b2

File tree

1 file changed

+4
-16
lines changed

1 file changed

+4
-16
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -96,29 +96,17 @@ DRS 2.1 includes 17 rule groups, as shown in the following table. Each group con
9696

9797
The following rules are disabled by default for DRS 2.1:
9898

99-
10099
|Rule ID |Rule Group|Description |Why disabled|
101100
|---------|---------|---------|---------|
102-
|932200 |LFI|RCE Bypass Technique |Missing MATCHED_VAR support in FDv2/Roxy|
103-
|942130 |SQLI |SQL Injection Attack: SQL Tautology Detected |Not supported by Regex engine |
104101
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Replaced by MSTIC rule 99031001 |
105102
|942150 |SQLI|SQL Injection Attack|Replaced by MSTIC rule 99031003 |
106103
|942260 |SQLI|Detects basic SQL authentication bypass attempts 2/3 |Replaced by MSTIC rule 99031004 |
107104
|942430 |SQLI|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Too many false positives.|
108105
|942440 |SQLI|SQL Comment Sequence Detected|Replaced by MSTIC rule 99031002 |
109-
|920380 |PROTOCOL-ENFORCEMENT |Too many arguments in request |Requires customer input to specify request limits |
110-
|920360 |PROTOCOL-ENFORCEMENT|Argument name too long |Requires customer input to specify request limits|
111-
|920370 |PROTOCOL-ENFORCEMENT|Argument name too long|Requires customer input to specify request limits|
112-
|920390 |PROTOCOL-932200 ENFORCEMENT |Total arguments size exceeded |Requires customer input to specify request limits|
113-
|920400 |PROTOCOL-ENFORCEMENT|Uploaded file size too large |Requires customer input to specify request limits |
114-
|920410 |PROTOCOL-ENFORCEMENT|Total uploaded files size too large |Requires customer input to specify request limits |
115-
|920250 |PROTOCOL-ENFORCEMENT|UTF8 Encoding Abuse Attack Attempt |Disabled by default in CRS |
116-
|913102 |SCANNER-DETECTION |Found User-Agent associated with web crawler/bot |To be integrated into Bot Manager ruleset |
117-
|913101 |SCANNER-DETECTION |Found User-Agent associated with scripting/generic HTTP client |To be integrated into Bot Manager ruleset |
118-
|913120 |SCANNER-DETECTION |Found request filename/argument associated with security scanner |To be integrated into Bot Manager ruleset |
119-
|913110 |SCANNER-DETECTION |Found request header associated with security scanner |To be integrated into Bot Manager ruleset |
120-
|913100 |SCANNER-DETECTION |Found User-Agent associated with security scanner |To be integrated into Bot Manager ruleset |
121-
106+
|99005006|MS-ThreatIntel-WebShells|Spring4Shell Interaction Attempt|Replaced by Microsoft threat intelligence rule.|
107+
|99001014|MS-ThreatIntel-CVEs|Attempted Spring Cloud routing-expression injection [CVE-2022-22963](https://www.cve.org/CVERecord?id=CVE-2022-22963)|Replaced by Microsoft threat intelligence rule.|
108+
|99001015|MS-ThreatIntel-WebShells|Attempted Spring Framework unsafe class object exploitation [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|Replaced by Microsoft threat intelligence rule.|
109+
|99001016|MS-ThreatIntel-WebShells|Attempted Spring Cloud Gateway Actuator injection [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)|Replaced by Microsoft threat intelligence rule.|
122110

123111
### DRS 2.0
124112

0 commit comments

Comments
 (0)