Skip to content

Commit fd3a5b5

Browse files
committed
tech review from Gunjan
1 parent 3280cfc commit fd3a5b5

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ CRS 3.2 includes 14 rule groups, as shown in the following table. Each group con
4646
|Rule group|Description|
4747
|---|---|
4848
|**[General](#general-32)**|General group|
49-
|**[REQUEST-800-KNOWN-CVES](#crs800-32)**|Help detect new and known CVEs|
49+
|**[KNOWN-CVES](#crs800-32)**|Help detect new and known CVEs|
5050
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-32)**|Lock-down methods (PUT, PATCH)|
5151
|**[REQUEST-913-SCANNER-DETECTION](#crs913-32)**|Protect against port and environment scanners|
5252
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-32)**|Protect against protocol and encoding issues|
@@ -71,7 +71,7 @@ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group con
7171
|Rule group|Description|
7272
|---|---|
7373
|**[General](#general-31)**|General group|
74-
|**[REQUEST-800-KNOWN-CVES](#crs800-31)**|Help detect new and known CVEs|
74+
|**[KNOWN-CVES](#crs800-31)**|Help detect new and known CVEs|
7575
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-31)**|Lock-down methods (PUT, PATCH)|
7676
|**[REQUEST-913-SCANNER-DETECTION](#crs913-31)**|Protect against port and environment scanners|
7777
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-31)**|Protect against protocol and encoding issues|
@@ -92,7 +92,7 @@ CRS 3.0 includes 13 rule groups, as shown in the following table. Each group con
9292
|Rule group|Description|
9393
|---|---|
9494
|**[General](#general-30)**|General group|
95-
|**[REQUEST-800-KNOWN-CVES](#crs800-30)**|Help detect new and known CVEs|
95+
|**[KNOWN-CVES](#crs800-30)**|Help detect new and known CVEs|
9696
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-30)**|Lock-down methods (PUT, PATCH)|
9797
|**[REQUEST-913-SCANNER-DETECTION](#crs913-30)**|Protect against port and environment scanners|
9898
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-30)**|Protect against protocol and encoding issues|
@@ -133,7 +133,7 @@ The following rule groups and rules are available when using Web Application Fir
133133
|---|---|
134134
|200004|Possible Multipart Unmatched Boundary.|
135135

136-
### <a name="crs800-32"></a> REQUEST-800-KNOWN-CVES
136+
### <a name="crs800-32"></a> KNOWN-CVES
137137
|RuleId|Description|
138138
|---|---|
139139
|800100|Rule to help detect and mitigate log4j vulnerability [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)|
@@ -374,7 +374,7 @@ The following rule groups and rules are available when using Web Application Fir
374374
|---|---|
375375
|200004|Possible Multipart Unmatched Boundary.|
376376

377-
### <a name="crs800-31"></a> REQUEST-800-KNOWN-CVES
377+
### <a name="crs800-31"></a> KNOWN-CVES
378378
|RuleId|Description|
379379
|---|---|
380380
|800100|Rule to help detect and mitigate log4j vulnerability [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)|
@@ -622,7 +622,7 @@ The following rule groups and rules are available when using Web Application Fir
622622
|---|---|
623623
|200004|Possible Multipart Unmatched Boundary.|
624624

625-
### <a name="crs800-30"></a> REQUEST-800-KNOWN-CVES
625+
### <a name="crs800-30"></a> KNOWN-CVES
626626
|RuleId|Description|
627627
|---|---|
628628
|800100|Rule to help detect and mitigate log4j vulnerability [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)|

0 commit comments

Comments
 (0)