Skip to content

Commit 8c80ef9

Browse files
Merge pull request #257335 from ZarrVenkat/DRS-2.1-GA
Drs 2.1 ga
2 parents 0178c23 + 7352848 commit 8c80ef9

File tree

1 file changed

+6
-9
lines changed

1 file changed

+6
-9
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -41,15 +41,15 @@ The version number of the DRS increments when new attack signatures are added to
4141
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Threat Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
4242

4343
> [!NOTE]
44-
> We suggest you to disable some of the rules while you get started with 2.1 on Application Gateway WAF. Details of the rules are as below.
44+
> Please follow the below guidance to tune WAF while you get started with 2.1 on Application Gateway WAF. Details of the rules are as below.
4545
4646
|Rule ID |Rule Group|Description |Details|
4747
|---------|---------|---------|---------|
48-
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Replaced by MSTIC rule 99031001 |
49-
|942150 |SQLI|SQL Injection Attack|Replaced by MSTIC rule 99031003 |
50-
|942260 |SQLI|Detects basic SQL authentication bypass attempts 2/3 |Replaced by MSTIC rule 99031004 |
51-
|942430 |SQLI|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Too many false positives.|
52-
|942440 |SQLI|SQL Comment Sequence Detected|Replaced by MSTIC rule 99031002 |
48+
|942110 |SQLI|SQL Injection Attack: Common Injection Testing Detected |Disable, Replaced by MSTIC rule 99031001 |
49+
|942150 |SQLI|SQL Injection Attack|Disable, Replaced by MSTIC rule 99031003 |
50+
|942260 |SQLI|Detects basic SQL authentication bypass attempts 2/3 |Disable, Replaced by MSTIC rule 99031004 |
51+
|942430 |SQLI|Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)|Disable, Too many false positives.|
52+
|942440 |SQLI|SQL Comment Sequence Detected|Disable, Replaced by MSTIC rule 99031002 |
5353
|99005006|MS-ThreatIntel-WebShells|Spring4Shell Interaction Attempt|Keep the rule enabled to prevent against SpringShell vulnerability|
5454
|99001014|MS-ThreatIntel-CVEs|Attempted Spring Cloud routing-expression injection [CVE-2022-22963](https://www.cve.org/CVERecord?id=CVE-2022-22963)|Keep the rule enabled to prevent against SpringShell vulnerability|
5555
|99001015|MS-ThreatIntel-WebShells|Attempted Spring Framework unsafe class object exploitation [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|Keep the rule enabled to prevent against SpringShell vulnerability|
@@ -385,9 +385,6 @@ The following rule groups and rules are available when using Web Application Fir
385385
|941370|JavaScript global variable found|
386386
|941380|AngularJS client side template injection detected|
387387

388-
>[!NOTE]
389-
> This article contains references to a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
390-
391388
### <a name="drs942-21"></a> SQLI - SQL Injection
392389
|RuleId|Description|
393390
|---|---|

0 commit comments

Comments
 (0)