Skip to content

Commit d10f14d

Browse files
Update waf-front-door-drs.md
1 parent c9c29ac commit d10f14d

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ Azure Web Application Firewall on Azure Front Door protects web applications fro
1414

1515
The Default Rule Set (DRS) also includes the Microsoft Threat Intelligence Collection rules that are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
1616

17+
> [!NOTE]
18+
> When a new ruleset version is assigned to a WAF, existing customizations of the previously assigned ruleset version will be set to the default for the new ruleset that is being assigned. See: [Upgrading or changing ruleset version](#upgrading-or-changing-ruleset-version).
19+
1720
## Default rule sets
1821

1922
The Azure-managed DRS includes rules against the following threat categories:
@@ -65,9 +68,9 @@ When your WAF uses an older version of the Default Rule Set (before DRS 2.0), yo
6568

6669
The version of the DRS that you use also determines which content types are supported for request body inspection. For more information, see [What content types does WAF support?](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ.
6770

68-
### Changing Rulesets
71+
### Upgrading or changing ruleset version
6972

70-
When you change ruleset versions, it is important to be aware that all of your previous customizations to the managed rulesets will be reset. These customizations include disabling specific rules, adjusting rule actions and applying exclusions. To make sure that you do not lose any of these custom configurations to your rulesets you can save your current configurations as a template before changing ruleset versions. You can keep this template if you ever need to revert to a previous configuration. You can also clone this template, update the ruleset type, ruleset version, and rule group name to match the ruleset your changing to, then deploy this updated template in your test environment to change rulesets while still preserving your customizations.
73+
When assigning a new managed ruleset to a WAF policy, all the previous customizations from the existing managed rulesets such as rule state, rule actions and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules and policy settings will remain unaffected during the new ruleset assignment. You will need to redefine rule overrides and validate changes before deploying in a production environment.
7174

7275
### DRS 2.1
7376

0 commit comments

Comments
 (0)