Skip to content

Commit 73cb1e1

Browse files
Merge pull request #250462 from vhorne/fw-prem
change # signature rules
2 parents f7ecc4f + 885f2c7 commit 73cb1e1

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/firewall/premium-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Azure Firewall Premium provides signature-based IDPS to allow rapid detection of
7272

7373
The Azure Firewall signatures/rulesets include:
7474
- An emphasis on fingerprinting actual malware, Command and Control, exploit kits, and in the wild malicious activity missed by traditional prevention methods.
75-
- Over 58,000 rules in over 50 categories.
75+
- Over 67,000 rules in over 50 categories.
7676
- The categories include malware command and control, phishing, trojans, botnets, informational events, exploits, vulnerabilities, SCADA network protocols, exploit kit activity, and more.
7777
- 20 to 40+ new rules are released each day.
7878
- Low false positive rating by using state-of-the-art malware detection techniques such as global sensor network feedback loop.

0 commit comments

Comments
 (0)