Skip to content

Commit 8c07572

Browse files
Merge pull request #214335 from vhorne/fw-prem-features
edit low false positive rating
2 parents f9fcc83 + 6613cdd commit 8c07572

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/firewall/premium-features.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: conceptual
8-
ms.date: 08/29/2022
8+
ms.date: 10/12/2022
99
ms.author: victorh
1010
ms.custom: references_regions
1111
---
@@ -71,7 +71,7 @@ The Azure Firewall signatures/rulesets include:
7171
- Over 58,000 rules in over 50 categories.
7272
- The categories include malware command and control, phishing, trojans, botnets, informational events, exploits, vulnerabilities, SCADA network protocols, exploit kit activity, and more.
7373
- 20 to 40+ new rules are released each day.
74-
- Low false positive rating by using state-of-the-art malware sandbox and global sensor network feedback loop.
74+
- Low false positive rating by using state-of-the-art malware detection techniques such as global sensor network feedback loop.
7575

7676
IDPS allows you to detect attacks in all ports and protocols for non-encrypted traffic. However, when HTTPS traffic needs to be inspected, Azure Firewall can use its TLS inspection capability to decrypt the traffic and better detect malicious activities.
7777

0 commit comments

Comments
 (0)