Skip to content

Commit b86e068

Browse files
committed
Acrolinx tweaks
1 parent 58a2145 commit b86e068

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The version number of the DRS increments when new attack signatures are added to
4040
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Threat Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
4141

4242
> [!NOTE]
43-
> Please use the following guidance to tune WAF while you get started with 2.1 on Application Gateway WAF. Details of the rules are described next.
43+
> Use the following guidance to tune WAF while you get started with 2.1 on Application Gateway WAF. Details of the rules are described next.
4444
4545
|Rule ID |Rule Group|Description |Details|
4646
|---------|---------|---------|---------|
@@ -77,7 +77,7 @@ The WAF protects against the following web vulnerabilities:
7777

7878
## Tuning of Managed rule sets
7979

80-
Both DRS and CRS are enabled by default in Detection mode in your WAF policies. You can disable or enable individual rules within the Managed Rule Set to meet your application requirements. You can also set specific actions per rule. The DRS/CRS supports block, log and anomaly score actions. The Bot Manager ruleset supports the allow, block and log actions.
80+
Both DRS and CRS are enabled by default in Detection mode in your WAF policies. You can disable or enable individual rules within the Managed Rule Set to meet your application requirements. You can also set specific actions per rule. The DRS/CRS supports block, log and anomaly score actions. The Bot Manager ruleset supports the allow, block, and log actions.
8181

8282
Sometimes you might need to omit certain request attributes from a WAF evaluation. A common example is Active Directory-inserted tokens that are used for authentication. You can configure exclusions to apply when specific WAF rules are evaluated, or to apply globally to the evaluation of all WAF rules. Exclusion rules apply to your whole web application. For more information, see [Web Application Firewall (WAF) with Application Gateway exclusion lists](application-gateway-waf-configuration.md).
8383

@@ -98,14 +98,14 @@ When you use CRS or DRS 2.1 and later, your WAF is configured to use anomaly sco
9898

9999
If the anomaly score is 5 or greater, and the WAF is in Prevention mode, the request is blocked. If the anomaly score is 5 or greater, and the WAF is in Detection mode, the request is logged but not blocked.
100100

101-
For example, a single *Critical* rule match is enough for the WAF to block a request when in Prevention mode, because the overall anomaly score is 5. However, one *Warning* rule match only increases the anomaly score by 3, which isn't enough by itself to block the traffic. When an anomaly rule is triggered, it shows a "Matched" action in the logs. If the anomaly score is 5 or greater, there is a separate rule triggered with either "Blocked" or "Detected" action depending on whether WAF policy is in Prevention or Detection mode. For more information, please see [Anomaly Scoring mode](ag-overview.md#anomaly-scoring-mode).
101+
For example, a single *Critical* rule match is enough for the WAF to block a request when in Prevention mode, because the overall anomaly score is 5. However, one *Warning* rule match only increases the anomaly score by 3, which isn't enough by itself to block the traffic. When an anomaly rule is triggered, it shows a "Matched" action in the logs. If the anomaly score is 5 or greater, there's a separate rule triggered with either "Blocked" or "Detected" action depending on whether WAF policy is in Prevention or Detection mode. For more information, please see [Anomaly Scoring mode](ag-overview.md#anomaly-scoring-mode).
102102

103103
### Upgrading or changing ruleset version
104104

105-
If you are upgrading, or assigning a new ruleset version, and would like to preserve existing rule overrides and exclusions, it is recommended to use PowerShell, CLI, REST API, or a templates to make ruleset version changes. A new version of a ruleset can have newer rules, additional rule groups, and may have updates to existing signatures to enforce better security and reduce false positives. It is recommended to validate changes in a test environment, fine tune if necessary, and then deploy in a production environment.
105+
If you're upgrading, or assigning a new ruleset version, and would like to preserve existing rule overrides and exclusions, it's recommended to use PowerShell, CLI, REST API, or a template to make ruleset version changes. A new version of a ruleset can have newer rules, additional rule groups, and may have updates to existing signatures to enforce better security and reduce false positives. It's recommended to validate changes in a test environment, fine tune if necessary, and then deploy in a production environment.
106106

107107
> [!NOTE]
108-
> If you are using the Azure portal to assign a new managed ruleset to a WAF policy, all the previous customizations from the existing managed ruleset such as rule state, rule actions, and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, policy settings, and global exclusions will remain unaffected during the new ruleset assignment. You will need to redefine rule overrides and validate changes before deploying in a production environment.
108+
> If you're using the Azure portal to assign a new managed ruleset to a WAF policy, all the previous customizations from the existing managed ruleset such as rule state, rule actions, and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, policy settings, and global exclusions will remain unaffected during the new ruleset assignment. You'll need to redefine rule overrides and validate changes before deploying in a production environment.
109109
110110
### DRS 2.1
111111

@@ -719,13 +719,13 @@ The following rule groups and rules are available when using Web Application Fir
719719
|942220|Looking for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 is the "magic number" crash|
720720
|942230|Detects conditional SQL injection attempts|
721721
|942240|Detects MySQL charset switch and MSSQL DoS attempts|
722-
|942250|Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections|
722+
|942250|Detects MATCH AGAINST, MERGE, and EXECUTE IMMEDIATE injections|
723723
|942251|Detects HAVING injections|
724724
|942260|Detects basic SQL authentication bypass attempts 2/3|
725-
|942270|Looking for basic sql injection. Common attack string for mysql, oracle and others|
725+
|942270|Looking for basic sql injection. Common attack string for mysql, oracle, and others|
726726
|942280|Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts|
727727
|942290|Finds basic MongoDB SQL injection attempts|
728-
|942300|Detects MySQL comments, conditions and ch(a)r injections|
728+
|942300|Detects MySQL comments, conditions, and ch(a)r injections|
729729
|942310|Detects chained SQL injection attempts 2/2|
730730
|942320|Detects MySQL and PostgreSQL stored procedure/function injections|
731731
|942330|Detects classic SQL injection probings 1/2|
@@ -977,13 +977,13 @@ The following rule groups and rules are available when using Web Application Fir
977977
|942220|Looking for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072|
978978
|942230|Detects conditional SQL injection attempts|
979979
|942240|Detects MySQL charset switch and MSSQL DoS attempts|
980-
|942250|Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections|
980+
|942250|Detects MATCH AGAINST, MERGE, and EXECUTE IMMEDIATE injections|
981981
|942251|Detects HAVING injections|
982982
|942260|Detects basic SQL authentication bypass attempts 2/3|
983983
|942270|Looking for basic sql injection. Common attack string for mysql oracle and others|
984984
|942280|Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts|
985985
|942290|Finds basic MongoDB SQL injection attempts|
986-
|942300|Detects MySQL comments, conditions and ch(a)r injections|
986+
|942300|Detects MySQL comments, conditions, and ch(a)r injections|
987987
|942310|Detects chained SQL injection attempts 2/2|
988988
|942320|Detects MySQL and PostgreSQL stored procedure/function injections|
989989
|942330|Detects classic SQL injection probings 1/2|

0 commit comments

Comments
 (0)