Skip to content

Commit ff330d1

Browse files
Merge pull request #276732 from vhorne/waf-ruleset
Update tables
2 parents b9ca261 + 6b793b0 commit ff330d1

File tree

2 files changed

+30
-30
lines changed

2 files changed

+30
-30
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: web-application-firewall
55
author: vhorne
66
ms.author: victorh
77
ms.topic: conceptual
8-
ms.date: 02/29/2024
8+
ms.date: 05/30/2024
99
---
1010

1111
# Web Application Firewall DRS rule groups and rules
@@ -74,7 +74,7 @@ DRS 2.1 includes 17 rule groups, as shown in the following table. Each group con
7474
> [!NOTE]
7575
> DRS 2.1 is only available on Azure Front Door Premium.
7676
77-
|Rule group|Managed rule group ID|Description|
77+
|Rule group|ruleGroupName|Description|
7878
|---|---|---|
7979
|[General](#general-21)|General|General group|
8080
|[METHOD-ENFORCEMENT](#drs911-21)|METHOD-ENFORCEMENT|Lock-down methods (PUT, PATCH)|
@@ -120,7 +120,7 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
120120
> [!NOTE]
121121
> DRS 2.0 is only available on Azure Front Door Premium.
122122
123-
|Rule group|Managed rule group ID|Description|
123+
|Rule group|ruleGroupName|Description|
124124
|---|---|---|
125125
|[General](#general-20)|General|General group|
126126
|[METHOD-ENFORCEMENT](#drs911-20)|METHOD-ENFORCEMENT|Lock-down methods (PUT, PATCH)|
@@ -141,7 +141,7 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
141141
|[MS-ThreatIntel-CVEs](#drs99001-20)|MS-ThreatIntel-CVEs|Protect against CVE attacks|
142142

143143
### DRS 1.1
144-
|Rule group|Managed rule group ID|Description|
144+
|Rule group|ruleGroupName|Description|
145145
|---|---|---|
146146
|[PROTOCOL-ATTACK](#drs921-11)|PROTOCOL-ATTACK|Protect against header injection, request smuggling, and response splitting|
147147
|[APPLICATION-ATTACK-LFI](#drs930-11)|LFI|Protect against file and path attacks|
@@ -159,7 +159,7 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
159159

160160
### DRS 1.0
161161

162-
|Rule group|Managed rule group ID|Description|
162+
|Rule group|ruleGroupName|Description|
163163
|---|---|---|
164164
|[PROTOCOL-ATTACK](#drs921-10)|PROTOCOL-ATTACK|Protect against header injection, request smuggling, and response splitting|
165165
|[APPLICATION-ATTACK-LFI](#drs930-10)|LFI|Protect against file and path attacks|

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This page provides information on web application firewall CRS rule
55
services: web-application-firewall
66
author: vhorne
77
ms.service: web-application-firewall
8-
ms.date: 01/25/2024
8+
ms.date: 05/30/2024
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -107,25 +107,25 @@ DRS 2.1 rules offer better protection than earlier versions of the DRS. It inclu
107107

108108
DRS 2.1 includes 17 rule groups, as shown in the following table. Each group contains multiple rules, and you can customize behavior for individual rules, rule groups, or entire rule set.
109109

110-
|Rule group|Description|
111-
|---|---|
112-
|**[General](#general-21)**|General group|
113-
|**[METHOD-ENFORCEMENT](#drs911-21)**|Lock-down methods (PUT, PATCH)|
114-
|**[PROTOCOL-ENFORCEMENT](#drs920-21)**|Protect against protocol and encoding issues|
115-
|**[PROTOCOL-ATTACK](#drs921-21)**|Protect against header injection, request smuggling, and response splitting|
116-
|**[APPLICATION-ATTACK-LFI](#drs930-21)**|Protect against file and path attacks|
117-
|**[APPLICATION-ATTACK-RFI](#drs931-21)**|Protect against remote file inclusion (RFI) attacks|
118-
|**[APPLICATION-ATTACK-RCE](#drs932-21)**|Protect again remote code execution attacks|
119-
|**[APPLICATION-ATTACK-PHP](#drs933-21)**|Protect against PHP-injection attacks|
120-
|**[APPLICATION-ATTACK-NodeJS](#drs934-21)**|Protect against Node JS attacks|
121-
|**[APPLICATION-ATTACK-XSS](#drs941-21)**|Protect against cross-site scripting attacks|
122-
|**[APPLICATION-ATTACK-SQLI](#drs942-21)**|Protect against SQL-injection attacks|
123-
|**[APPLICATION-ATTACK-SESSION-FIXATION](#drs943-21)**|Protect against session-fixation attacks|
124-
|**[APPLICATION-ATTACK-SESSION-JAVA](#drs944-21)**|Protect against JAVA attacks|
125-
|**[MS-ThreatIntel-WebShells](#drs9905-21)**|Protect against Web shell attacks|
126-
|**[MS-ThreatIntel-AppSec](#drs9903-21)**|Protect against AppSec attacks|
127-
|**[MS-ThreatIntel-SQLI](#drs99031-21)**|Protect against SQLI attacks|
128-
|**[MS-ThreatIntel-CVEs](#drs99001-21)**|Protect against CVE attacks|
110+
|Rule group|ruleGroupName|Description|
111+
|---|---|---|
112+
|**[General](#general-21)**|General|General group|
113+
|**[METHOD-ENFORCEMENT](#drs911-21)**|METHOD-ENFORCEMENT|Lock-down methods (PUT, PATCH)|
114+
|**[PROTOCOL-ENFORCEMENT](#drs920-21)**|PROTOCOL-ENFORCEMENT|Protect against protocol and encoding issues|
115+
|**[PROTOCOL-ATTACK](#drs921-21)**|PROTOCOL-ATTACK|Protect against header injection, request smuggling, and response splitting|
116+
|**[APPLICATION-ATTACK-LFI](#drs930-21)**|LFI|Protect against file and path attacks|
117+
|**[APPLICATION-ATTACK-RFI](#drs931-21)**|RFI|Protect against remote file inclusion (RFI) attacks|
118+
|**[APPLICATION-ATTACK-RCE](#drs932-21)**|RCE|Protect again remote code execution attacks|
119+
|**[APPLICATION-ATTACK-PHP](#drs933-21)**|PHP|Protect against PHP-injection attacks|
120+
|**[APPLICATION-ATTACK-NodeJS](#drs934-21)**|NODEJS|Protect against Node JS attacks|
121+
|**[APPLICATION-ATTACK-XSS](#drs941-21)**|XSS|Protect against cross-site scripting attacks|
122+
|**[APPLICATION-ATTACK-SQLI](#drs942-21)**|SQLI|Protect against SQL-injection attacks|
123+
|**[APPLICATION-ATTACK-SESSION-FIXATION](#drs943-21)**|FIX|Protect against session-fixation attacks|
124+
|**[APPLICATION-ATTACK-SESSION-JAVA](#drs944-21)**|JAVA|Protect against JAVA attacks|
125+
|**[MS-ThreatIntel-WebShells](#drs9905-21)**|MS-ThreatIntel-WebShells|Protect against Web shell attacks|
126+
|**[MS-ThreatIntel-AppSec](#drs9903-21)**|MS-ThreatIntel-AppSec|Protect against AppSec attacks|
127+
|**[MS-ThreatIntel-SQLI](#drs99031-21)**|MS-ThreatIntel-SQLI|Protect against SQLI attacks|
128+
|**[MS-ThreatIntel-CVEs](#drs99001-21)**|MS-ThreatIntel-CVEs|Protect against CVE attacks|
129129

130130

131131
### OWASP CRS 3.2
@@ -135,7 +135,7 @@ CRS 3.2 includes 14 rule groups, as shown in the following table. Each group con
135135
> [!NOTE]
136136
> CRS 3.2 is only available on the WAF_v2 SKU. Because CRS 3.2 runs on the new Azure WAF engine, you can't downgrade to CRS 3.1 or earlier. If you need to downgrade, [contact Azure Support](https://aka.ms/azuresupportrequest).
137137
138-
|Rule group|Description|
138+
|Rule group name|Description|
139139
|---|---|
140140
|**[General](#general-32)**|General group|
141141
|**[KNOWN-CVES](#crs800-32)**|Help detect new and known CVEs|
@@ -160,7 +160,7 @@ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group con
160160
> [!NOTE]
161161
> CRS 3.1 is only available on the WAF_v2 SKU.
162162
163-
|Rule group|Description|
163+
|Rule group name|Description|
164164
|---|---|
165165
|**[General](#general-31)**|General group|
166166
|**[KNOWN-CVES](#crs800-31)**|Help detect new and known CVEs|
@@ -181,7 +181,7 @@ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group con
181181

182182
CRS 3.0 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled. The ruleset is based off OWASP CRS 3.0.0 version.
183183

184-
|Rule group|Description|
184+
|Rule group name|Description|
185185
|---|---|
186186
|**[General](#general-30)**|General group|
187187
|**[KNOWN-CVES](#crs800-30)**|Help detect new and known CVEs|
@@ -204,7 +204,7 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
204204
> [!NOTE]
205205
> CRS 2.2.9 is no longer supported for new WAF policies. We recommend you upgrade to the latest CRS version. CRS 2.2.9 can't be used along with CRS 3.2/DRS 2.1 and greater versions.
206206
207-
|Rule group|Description|
207+
|Rule group name|Description|
208208
|---|---|
209209
|**[crs_20_protocol_violations](#crs20)**|Protect against protocol violations (such as invalid characters or a GET with a request body)|
210210
|**[crs_21_protocol_anomalies](#crs21)**|Protect against incorrect header information|
@@ -221,7 +221,7 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
221221

222222
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
223223

224-
|Rule group|Description|
224+
|Rule group name|Description|
225225
|---|---|
226226
|**[BadBots](#bot100)**|Protect against bad bots|
227227
|**[GoodBots](#bot200)**|Identify good bots|

0 commit comments

Comments
 (0)