Skip to content

Commit 7a9fff7

Browse files
Merge pull request #288929 from Miskatonic-Electronic/patch-44
Update application-gateway-crs-rulegroups-rules.md
2 parents d45aeb2 + 3318c6f commit 7a9fff7

File tree

1 file changed

+11
-4
lines changed

1 file changed

+11
-4
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: CRS rule groups and rules
2+
title: CRS and DRS rule groups and rules
33
titleSuffix: Azure Web Application Firewall
4-
description: This page provides information on web application firewall CRS rule groups and rules.
4+
description: This page provides information on web application firewall CRS and DRS rule groups and rules.
55
services: web-application-firewall
66
author: vhorne
77
ms.service: azure-web-application-firewall
8-
ms.date: 05/30/2024
8+
ms.date: 10/23/2024
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -19,7 +19,7 @@ You also have the option of using rules that are defined based on the OWASP core
1919
You can disable rules individually, or set specific actions for each rule. This article lists the current rules and rule sets available. If a published rule set requires an update, we'll document it here.
2020

2121
> [!NOTE]
22-
> When changing from one ruleset version to another all disabled and enabled rule settings will return to the default for the ruleset you're migrating to. This means that if you previously disabled or enabled a rule, you will need to disable or enable it again once you've moved to the new ruleset version.
22+
> When a ruleset version is changed in a WAF Policy, any existing customizations you made to your ruleset will be reset to the defaults for the new ruleset. See: [Upgrading or changing ruleset version](#upgrading-or-changing-ruleset-version).
2323
2424
## Default rule sets
2525

@@ -101,6 +101,13 @@ If the anomaly score is 5 or greater, and the WAF is in Prevention mode, the req
101101

102102
For example, a single *Critical* rule match is enough for the WAF to block a request when in Prevention mode, because the overall anomaly score is 5. However, one *Warning* rule match only increases the anomaly score by 3, which isn't enough by itself to block the traffic. When an anomaly rule is triggered, it shows a "Matched" action in the logs. If the anomaly score is 5 or greater, there is a separate rule triggered with either "Blocked" or "Detected" action depending on whether WAF policy is in Prevention or Detection mode. For more information, please see [Anomaly Scoring mode](ag-overview.md#anomaly-scoring-mode).
103103

104+
### Upgrading or changing ruleset version
105+
106+
If you are upgrading, or assigning a new ruleset version, and would like to preserve existing rule overrides and exclusions, it is recommended to use PowerShell, CLI, REST API, or a templates to make ruleset version changes. A new version of a ruleset can have newer rules, additional rule groups, and may have updates to existing signatures to enforce better security and reduce false positives. It is recommended to validate changes in a test environment, fine tune if necessary, and then deploy in a production environment.
107+
108+
> [!NOTE]
109+
> If you are using the Azure portal to assign a new managed ruleset to a WAF policy, all the previous customizations from the existing managed ruleset such as rule state, rule actions, and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, policy settings, and global exclusions will remain unaffected during the new ruleset assignment. You will need to redefine rule overrides and validate changes before deploying in a production environment.
110+
104111
### DRS 2.1
105112

106113
DRS 2.1 rules offer better protection than earlier versions of the DRS. It includes more rules developed by the Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.

0 commit comments

Comments
 (0)