Skip to content

Commit d43e77f

Browse files
committed
Updates
1 parent 3f4645c commit d43e77f

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,11 @@ Custom rules are always applied before rules in the Default Rule Set are evaluat
3939

4040
The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.
4141

42-
### Anomaly scoring mode
42+
### <a name="anomaly-scoring-mode"></a>Anomaly scoring
4343

44-
When you use DRS 2.0 or later, your WAF uses the *anomaly scoring*.
44+
When you use DRS 2.0 or later, your WAF uses *anomaly scoring*. Traffic that matches any rule isn't immediately blocked, even when your WAF is in prevention mode. Instead, the OWASP rule sets define a severity for each rule: *Critical*, *Error*, *Warning*, or *Notice*. The severity affects a numeric value for the request, which is called the *anomaly score*:
4545

46-
Traffic that matches any rule isn't immediately blocked, even when your WAF is in prevention mode. Instead, the OWASP rule sets define a severity for each rule: *Critical*, *Error*, *Warning*, or *Notice*. The severity affects a numeric value for the request, which is called the *anomaly score*:
47-
48-
| Severity | Contributes to anomaly score |
46+
| Rule severity | Contributes to anomaly score |
4947
|-|-|
5048
| Critical | 5 |
5149
| Error | 4 |

0 commit comments

Comments
 (0)