You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,15 +41,15 @@ The version number of the DRS increments when new attack signatures are added to
41
41
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Threat Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
42
42
43
43
> [!NOTE]
44
-
> We suggest you to disable some of the rules while you get started with 2.1 on Application Gateway WAF. Details of the rules are as below.
44
+
> Please follow the below guidance to tune WAF while you get started with 2.1 on Application Gateway WAF. Details of the rules are as below.
45
45
46
46
|Rule ID |Rule Group|Description |Details|
47
47
|---------|---------|---------|---------|
48
-
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Replaced by MSTIC rule 99031001 |
49
-
|942150 |SQLI|SQL Injection Attack|Replaced by MSTIC rule 99031003 |
|99005006|MS-ThreatIntel-WebShells|Spring4Shell Interaction Attempt|Keep the rule enabled to prevent against SpringShell vulnerability|
54
54
|99001014|MS-ThreatIntel-CVEs|Attempted Spring Cloud routing-expression injection [CVE-2022-22963](https://www.cve.org/CVERecord?id=CVE-2022-22963)|Keep the rule enabled to prevent against SpringShell vulnerability|
55
55
|99001015|MS-ThreatIntel-WebShells|Attempted Spring Framework unsafe class object exploitation [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|Keep the rule enabled to prevent against SpringShell vulnerability|
@@ -385,9 +385,6 @@ The following rule groups and rules are available when using Web Application Fir
385
385
|941370|JavaScript global variable found|
386
386
|941380|AngularJS client side template injection detected|
387
387
388
-
>[!NOTE]
389
-
> This article contains references to a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
0 commit comments