Skip to content

Commit c4cbbd9

Browse files
committed
Updates
1 parent 8e2e6ac commit c4cbbd9

File tree

2 files changed

+10
-9
lines changed

2 files changed

+10
-9
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: web-application-firewall
55
author: vhorne
66
ms.author: victorh
77
ms.topic: conceptual
8-
ms.date: 08/21/2022
8+
ms.date: 08/28/2022
99
---
1010

1111
# Web Application Firewall DRS rule groups and rules
@@ -14,7 +14,7 @@ Azure Front Door web application firewall (WAF) protects web applications from c
1414

1515
## Default rule sets
1616

17-
Azure-managed Default Rule Set includes rules against the following threat categories:
17+
The Azure-managed Default Rule Set (DRS) includes rules against the following threat categories:
1818

1919
- Cross-site scripting
2020
- Java attacks
@@ -26,18 +26,19 @@ Azure-managed Default Rule Set includes rules against the following threat categ
2626
- SQL injection protection
2727
- Protocol attackers
2828

29-
The version number of the Default Rule Set increments when new attack signatures are added to the rule set.
30-
Default Rule Set is enabled by default in Detection mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions (ALLOW/BLOCK/REDIRECT/LOG) per rule.
29+
The version number of the DRS increments when new attack signatures are added to the rule set.
3130

32-
Sometimes you may need to omit certain request attributes from a WAF evaluation. A common example is Active Directory-inserted tokens that are used for authentication. You may configure an exclusion list for a managed rule, rule group, or for the entire rule set.
31+
DRS is enabled by default in Detection mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions per rule. Available actions are *allow*, *block*, *redirect*, and *log*).
3332

34-
The Default action is to block. Additionally, custom rules can be configured in the same WAF policy if you wish to bypass any of the pre-configured rules in the Default Rule Set.
33+
Sometimes you might need to omit certain request attributes from a WAF evaluation. A common example is Active Directory-inserted tokens that are used for authentication. You may configure an exclusion list for a managed rule, rule group, or for the entire rule set. For more information, see [Web Application Firewall (WAF) with Front Door exclusion lists](./waf-front-door-exclusion.md).
34+
35+
By default, DRS blocks requests that trigger the rules. Additionally, custom rules can be configured in the same WAF policy if you wish to bypass any of the pre-configured rules in the Default Rule Set.
3536

3637
Custom rules are always applied before rules in the Default Rule Set are evaluated. If a request matches a custom rule, the corresponding rule action is applied. The request is either blocked or passed through to the back-end. No other custom rules or the rules in the Default Rule Set are processed. You can also remove the Default Rule Set from your WAF policies.
3738

3839
### Microsoft Threat Intelligence Collection rules
3940

40-
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
41+
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Threat Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
4142

4243
### <a name="anomaly-scoring-mode"></a>Anomaly scoring
4344

@@ -60,7 +61,7 @@ The version of the DRS that you use also determines which content types are supp
6061

6162
### DRS 2.0
6263

63-
DRS 2.0 includes 17 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
64+
DRS 2.0 includes 17 rule groups, as shown in the following table. Each group contains multiple rules, and you can disable individual rules as well as entire rule groups.
6465

6566
> [!NOTE]
6667
> DRS 2.0 is only available on Azure Front Door Premium.

articles/web-application-firewall/afds/waf-front-door-exclusion.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: victorh
99
ms.topic: conceptual
1010
---
1111

12-
# Web Application Firewall (WAF) with Front Door Service exclusion lists
12+
# Web Application Firewall (WAF) with Front Door exclusion lists
1313

1414
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. The rest of the request is evaluated as normal.
1515

0 commit comments

Comments
 (0)