Skip to content

Commit 884fa04

Browse files
Merge pull request #264260 from vhorne/waf-crs-fresh
freshness review
2 parents 8c29e00 + a593ac1 commit 884fa04

File tree

1 file changed

+30
-30
lines changed

1 file changed

+30
-30
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,21 @@ description: This page provides information on web application firewall CRS rule
55
services: web-application-firewall
66
author: vhorne
77
ms.service: web-application-firewall
8-
ms.date: 11/08/2022
8+
ms.date: 01/25/2024
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
1212

1313
# Web Application Firewall DRS and CRS rule groups and rules
1414

15-
Application Gateway web application firewall (WAF) protects web applications from common vulnerabilities and exploits. Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Since such rule sets are managed by Azure, the rules are updated as needed to protect against new attack signatures. Default rule set also includes the Microsoft Threat Intelligence Collection rules that are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
15+
The Azure-managed rule sets in the Application Gateway web application firewall (WAF) actively protect web applications from common vulnerabilities and exploits. These rule sets, managed by Azure, receive updates as necessary to guard against new attack signatures. The default rule set also incorporates the Microsoft Threat Intelligence Collection rules. The Microsoft Intelligence team collaborates in writing these rules, ensuring enhanced coverage, specific vulnerability patches, and improved false positive reduction.
1616

17-
Customers also have the option of using rules that are defined based on the OWASP core rule sets 3.2, 3.1, 3.0, or 2.2.9.
17+
You also have the option of using rules that are defined based on the OWASP core rule sets 3.2, 3.1, 3.0, or 2.2.9.
1818

19-
Rules can be disabled on a rule-by-rule basis, or you can set specific actions by individual rule. This article contains the current rules and rule sets offered. In the rare occasion that a published ruleset needs to be updated, it will be documented here.
19+
You can disable rules individually, or set specific actions for each rule. This article lists the current rules and rule sets available. If a published rule set requires an update, we'll document it here.
2020

2121
> [!NOTE]
22-
> When changing from one ruleset version to another all disabled and enabled rule settings will return to the default for the ruleset your are migrating to. This means that if you previously disabled or enabled a rule, you will need to disable or enable it again once you've moved to the new ruleset version.
22+
> When changing from one ruleset version to another all disabled and enabled rule settings will return to the default for the ruleset you're migrating to. This means that if you previously disabled or enabled a rule, you will need to disable or enable it again once you've moved to the new ruleset version.
2323
2424
## Default rule sets
2525

@@ -41,7 +41,7 @@ The version number of the DRS increments when new attack signatures are added to
4141
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Threat Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
4242

4343
> [!NOTE]
44-
> Please follow the below guidance to tune WAF while you get started with 2.1 on Application Gateway WAF. Details of the rules are as below.
44+
> Please use the following guidance to tune WAF while you get started with 2.1 on Application Gateway WAF. Details of the rules are described next.
4545
4646
|Rule ID |Rule Group|Description |Details|
4747
|---------|---------|---------|---------|
@@ -59,7 +59,7 @@ The Microsoft Threat Intelligence Collection rules are written in partnership wi
5959

6060
## Core rule sets
6161

62-
The Application Gateway WAF comes pre-configured with CRS 3.2 by default, but you can choose to use any other supported CRS version.
62+
The Application Gateway WAF comes preconfigured with CRS 3.2 by default, but you can choose to use any other supported CRS version.
6363

6464
CRS 3.2 offers a new engine and new rule sets defending against Java injections, an initial set of file upload checks, and fewer false positives compared with earlier versions of CRS. You can also [customize rules to suit your needs](application-gateway-customize-waf-rules-portal.md). Learn more about the new [Azure WAF engine](waf-engine.md).
6565

@@ -82,7 +82,7 @@ Both DRS and CRS are enabled by default in Detection mode in your WAF policies.
8282

8383
Sometimes you might need to omit certain request attributes from a WAF evaluation. A common example is Active Directory-inserted tokens that are used for authentication. You can configure exclusions to apply when specific WAF rules are evaluated, or to apply globally to the evaluation of all WAF rules. Exclusion rules apply to your whole web application. For more information, see [Web Application Firewall (WAF) with Application Gateway exclusion lists](application-gateway-waf-configuration.md).
8484

85-
By default, DRS version 2.1 / CRS version 3.2 and above will leverage anomaly scoring when a request matches a rule, CRS 3.1 and below will block matching requests by default. Additionally, custom rules can be configured in the same WAF policy if you wish to bypass any of the pre-configured rules in the Core Rule Set.
85+
By default, DRS version 2.1 / CRS version 3.2 and above uses anomaly scoring when a request matches a rule. CRS 3.1 and below blocks matching requests by default. Additionally, custom rules can be configured in the same WAF policy if you want to bypass any of the preconfigured rules in the Core Rule Set.
8686

8787
Custom rules are always applied before rules in the Core Rule Set are evaluated. If a request matches a custom rule, the corresponding rule action is applied. The request is either blocked or passed through to the back-end. No other custom rules or the rules in the Core Rule Set are processed.
8888

@@ -103,7 +103,7 @@ For example, a single *Critical* rule match is enough for the WAF to block a req
103103

104104
### DRS 2.1
105105

106-
DRS 2.1 rules offer better protection than earlier versions of the DRS. It includes additional rules developed by the Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.
106+
DRS 2.1 rules offer better protection than earlier versions of the DRS. It includes more rules developed by the Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.
107107

108108
DRS 2.1 includes 17 rule groups, as shown in the following table. Each group contains multiple rules, and you can customize behavior for individual rules, rule groups, or entire rule set.
109109

@@ -243,15 +243,15 @@ The following rule groups and rules are available when using Web Application Fir
243243
### <a name="drs911-21"></a> METHOD ENFORCEMENT
244244
|RuleId|Description|
245245
|---|---|
246-
|911100|Method is not allowed by policy|
246+
|911100|Method isn't allowed by policy|
247247

248248
### <a name="drs920-21"></a> PROTOCOL-ENFORCEMENT
249249
|RuleId|Description|
250250
|---|---|
251251
|920100|Invalid HTTP Request Line|
252252
|920120|Attempted multipart/form-data bypass|
253253
|920121|Attempted multipart/form-data bypass|
254-
|920160|Content-Length HTTP header is not numeric.|
254+
|920160|Content-Length HTTP header isn't numeric.|
255255
|920170|GET or HEAD Request with Body Content.|
256256
|920171|GET or HEAD Request with Transfer-Encoding.|
257257
|920180|POST request missing Content-Length Header.|
@@ -276,12 +276,12 @@ The following rule groups and rules are available when using Web Application Fir
276276
|920340|Request Containing Content, but Missing Content-Type header|
277277
|920341|Request containing content requires Content-Type header|
278278
|920350|Host header is a numeric IP address|
279-
|920420|Request content type is not allowed by policy|
280-
|920430|HTTP protocol version is not allowed by policy|
279+
|920420|Request content type isn't allowed by policy|
280+
|920430|HTTP protocol version isn't allowed by policy|
281281
|920440|URL file extension is restricted by policy|
282282
|920450|HTTP header is restricted by policy|
283283
|920470|Illegal Content-Type header|
284-
|920480|Request content type charset is not allowed by policy|
284+
|920480|Request content type charset isn't allowed by policy|
285285
|920500|Attempt to access a backup or working file|
286286

287287
### <a name="drs921-21"></a> PROTOCOL-ATTACK
@@ -527,7 +527,7 @@ The following rule groups and rules are available when using Web Application Fir
527527
### <a name="crs911-32"></a> REQUEST-911-METHOD-ENFORCEMENT
528528
|RuleId|Description|
529529
|---|---|
530-
|911100|Method is not allowed by policy|
530+
|911100|Method isn't allowed by policy|
531531

532532
### <a name="crs913-32"></a> REQUEST-913-SCANNER-DETECTION
533533
|RuleId|Description|
@@ -544,7 +544,7 @@ The following rule groups and rules are available when using Web Application Fir
544544
|920100|Invalid HTTP Request Line|
545545
|920120|Attempted multipart/form-data bypass|
546546
|920121|Attempted multipart/form-data bypass|
547-
|920160|Content-Length HTTP header is not numeric.|
547+
|920160|Content-Length HTTP header isn't numeric.|
548548
|920170|GET or HEAD Request with Body Content.|
549549
|920171|GET or HEAD Request with Transfer-Encoding.|
550550
|920180|POST request missing Content-Length Header.|
@@ -573,8 +573,8 @@ The following rule groups and rules are available when using Web Application Fir
573573
|920340|Request Containing Content, but Missing Content-Type header|
574574
|920341|Request containing content requires Content-Type header|
575575
|920350|Host header is a numeric IP address|
576-
|920420|Request content type is not allowed by policy|
577-
|920430|HTTP protocol version is not allowed by policy|
576+
|920420|Request content type isn't allowed by policy|
577+
|920430|HTTP protocol version isn't allowed by policy|
578578
|920440|URL file extension is restricted by policy|
579579
|920450|HTTP header is restricted by policy (%{MATCHED_VAR})|
580580
|920460|Abnormal Escape Characters|
@@ -779,7 +779,7 @@ The following rule groups and rules are available when using Web Application Fir
779779

780780
|RuleId|Description|
781781
|---|---|
782-
|911100|Method is not allowed by policy|
782+
|911100|Method isn't allowed by policy|
783783

784784

785785
### <a name="crs913-31"></a> REQUEST-913-SCANNER-DETECTION
@@ -802,7 +802,7 @@ The following rule groups and rules are available when using Web Application Fir
802802
|920121|Attempted multipart/form-data bypass|
803803
|920130|Failed to parse request body.|
804804
|920140|Multipart request body failed strict validation|
805-
|920160|Content-Length HTTP header is not numeric.|
805+
|920160|Content-Length HTTP header isn't numeric.|
806806
|920170|GET or HEAD Request with Body Content.|
807807
|920171|GET or HEAD Request with Transfer-Encoding.|
808808
|920180|POST request missing Content-Length Header.|
@@ -831,8 +831,8 @@ The following rule groups and rules are available when using Web Application Fir
831831
|920340|Request Containing Content but Missing Content-Type header|
832832
|920341|Request containing content requires Content-Type header|
833833
|920350|Host header is a numeric IP address|
834-
|920420|Request content type is not allowed by policy|
835-
|920430|HTTP protocol version is not allowed by policy|
834+
|920420|Request content type isn't allowed by policy|
835+
|920430|HTTP protocol version isn't allowed by policy|
836836
|920440|URL file extension is restricted by policy|
837837
|920450|HTTP header is restricted by policy (%@{MATCHED_VAR})|
838838
|920460|Abnormal Escape Characters|
@@ -1031,7 +1031,7 @@ The following rule groups and rules are available when using Web Application Fir
10311031

10321032
|RuleId|Description|
10331033
|---|---|
1034-
|911100|Method is not allowed by policy|
1034+
|911100|Method isn't allowed by policy|
10351035

10361036

10371037
### <a name="crs913-30"></a> REQUEST-913-SCANNER-DETECTION
@@ -1051,7 +1051,7 @@ The following rule groups and rules are available when using Web Application Fir
10511051
|920100|Invalid HTTP Request Line|
10521052
|920130|Failed to parse request body.|
10531053
|920140|Multipart request body failed strict validation|
1054-
|920160|Content-Length HTTP header is not numeric.|
1054+
|920160|Content-Length HTTP header isn't numeric.|
10551055
|920170|GET or HEAD Request with Body Content.|
10561056
|920180|POST request missing Content-Length Header.|
10571057
|920190|Range = Invalid Last Byte Value.|
@@ -1074,8 +1074,8 @@ The following rule groups and rules are available when using Web Application Fir
10741074
|920390|Total arguments size exceeded|
10751075
|920400|Uploaded file size too large|
10761076
|920410|Total uploaded files size too large|
1077-
|920420|Request content type is not allowed by policy|
1078-
|920430|HTTP protocol version is not allowed by policy|
1077+
|920420|Request content type isn't allowed by policy|
1078+
|920430|HTTP protocol version isn't allowed by policy|
10791079
|920440|URL file extension is restricted by policy|
10801080
|920450|HTTP header is restricted by policy (%@{MATCHED_VAR})|
10811081
|920200|Range = Too many fields (6 or more)|
@@ -1230,7 +1230,7 @@ The following rule groups and rules are available when using Web Application Fir
12301230
|960912|Failed to parse request body.|
12311231
|960914|Multipart request body failed strict validation|
12321232
|960915|Multipart parser detected a possible unmatched boundary.|
1233-
|960016|Content-Length HTTP header is not numeric.|
1233+
|960016|Content-Length HTTP header isn't numeric.|
12341234
|960011|GET or HEAD Request with Body Content.|
12351235
|960012|POST request missing Content-Length Header.|
12361236
|960902|Invalid Use of Identity Encoding.|
@@ -1275,9 +1275,9 @@ The following rule groups and rules are available when using Web Application Fir
12751275

12761276
|RuleId|Description|
12771277
|---|---|
1278-
|960032|Method is not allowed by policy|
1279-
|960010|Request content type is not allowed by policy|
1280-
|960034|HTTP protocol version is not allowed by policy|
1278+
|960032|Method isn't allowed by policy|
1279+
|960010|Request content type isn't allowed by policy|
1280+
|960034|HTTP protocol version isn't allowed by policy|
12811281
|960035|URL file extension is restricted by policy|
12821282
|960038|HTTP header is restricted by policy|
12831283

0 commit comments

Comments
 (0)