Skip to content

Commit c8b4ee7

Browse files
Merge pull request #288933 from Miskatonic-Electronic/patch-46
Update waf-front-door-drs.md
2 parents 7a9fff7 + ec3a926 commit c8b4ee7

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ Azure Web Application Firewall on Azure Front Door protects web applications fro
1414

1515
The Default Rule Set (DRS) also includes the Microsoft Threat Intelligence Collection rules that are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
1616

17+
> [!NOTE]
18+
> When a ruleset version is changed in a WAF Policy, any existing customizations you made to your ruleset will be reset to the defaults for the new ruleset. See: [Upgrading or changing ruleset version](#upgrading-or-changing-ruleset-version).
19+
1720
## Default rule sets
1821

1922
The Azure-managed DRS includes rules against the following threat categories:
@@ -65,6 +68,13 @@ When your WAF uses an older version of the Default Rule Set (before DRS 2.0), yo
6568

6669
The version of the DRS that you use also determines which content types are supported for request body inspection. For more information, see [What content types does WAF support?](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ.
6770

71+
### Upgrading or changing ruleset version
72+
73+
If you are upgrading, or assigning a new ruleset version, and would like to preserve existing rule overrides and exclusions, it is recommended to use PowerShell, CLI, REST API, or a templates to make ruleset version changes. A new version of a ruleset can have newer rules, additional rule groups, and may have updates to existing signatures to enforce better security and reduce false positives. It is recommended to validate changes in a test environment, fine tune if necessary, and then deploy in a production environment.
74+
75+
> [!NOTE]
76+
> If you are using the Azure portal to assign a new managed ruleset to a WAF policy, all the previous customizations from the existing managed ruleset such as rule state, rule actions, and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, or policy settings will remain unaffected during the new ruleset assignment. You will need to redefine rule overrides and validate changes before deploying in a production environment.
77+
6878
### DRS 2.1
6979

7080
DRS 2.1 rules offer better protection than earlier versions of the DRS. It includes other rules developed by the Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.

0 commit comments

Comments
 (0)