You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md
+25-25Lines changed: 25 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: This page provides information on web application firewall CRS rule
5
5
services: web-application-firewall
6
6
author: vhorne
7
7
ms.service: web-application-firewall
8
-
ms.date: 01/25/2024
8
+
ms.date: 05/30/2024
9
9
ms.author: victorh
10
10
ms.topic: conceptual
11
11
---
@@ -107,25 +107,25 @@ DRS 2.1 rules offer better protection than earlier versions of the DRS. It inclu
107
107
108
108
DRS 2.1 includes 17 rule groups, as shown in the following table. Each group contains multiple rules, and you can customize behavior for individual rules, rule groups, or entire rule set.
|**[PROTOCOL-ENFORCEMENT](#drs920-21)**|PROTOCOL-ENFORCEMENT|Protect against protocol and encoding issues|
115
+
|**[PROTOCOL-ATTACK](#drs921-21)**|PROTOCOL-ATTACK|Protect against header injection, request smuggling, and response splitting|
116
+
|**[APPLICATION-ATTACK-LFI](#drs930-21)**|LFI|Protect against file and path attacks|
117
+
|**[APPLICATION-ATTACK-RFI](#drs931-21)**|RFI|Protect against remote file inclusion (RFI) attacks|
118
+
|**[APPLICATION-ATTACK-RCE](#drs932-21)**|RCE|Protect again remote code execution attacks|
119
+
|**[APPLICATION-ATTACK-PHP](#drs933-21)**|PHP|Protect against PHP-injection attacks|
120
+
|**[APPLICATION-ATTACK-NodeJS](#drs934-21)**|NODEJS|Protect against Node JS attacks|
121
+
|**[APPLICATION-ATTACK-XSS](#drs941-21)**|XSS|Protect against cross-site scripting attacks|
122
+
|**[APPLICATION-ATTACK-SQLI](#drs942-21)**|SQLI|Protect against SQL-injection attacks|
123
+
|**[APPLICATION-ATTACK-SESSION-FIXATION](#drs943-21)**|FIX|Protect against session-fixation attacks|
124
+
|**[APPLICATION-ATTACK-SESSION-JAVA](#drs944-21)**|JAVA|Protect against JAVA attacks|
125
+
|**[MS-ThreatIntel-WebShells](#drs9905-21)**|MS-ThreatIntel-WebShells|Protect against Web shell attacks|
126
+
|**[MS-ThreatIntel-AppSec](#drs9903-21)**|MS-ThreatIntel-AppSec|Protect against AppSec attacks|
127
+
|**[MS-ThreatIntel-SQLI](#drs99031-21)**|MS-ThreatIntel-SQLI|Protect against SQLI attacks|
128
+
|**[MS-ThreatIntel-CVEs](#drs99001-21)**|MS-ThreatIntel-CVEs|Protect against CVE attacks|
129
129
130
130
131
131
### OWASP CRS 3.2
@@ -135,7 +135,7 @@ CRS 3.2 includes 14 rule groups, as shown in the following table. Each group con
135
135
> [!NOTE]
136
136
> CRS 3.2 is only available on the WAF_v2 SKU. Because CRS 3.2 runs on the new Azure WAF engine, you can't downgrade to CRS 3.1 or earlier. If you need to downgrade, [contact Azure Support](https://aka.ms/azuresupportrequest).
137
137
138
-
|Rule group|Description|
138
+
|Rule group name|Description|
139
139
|---|---|
140
140
|**[General](#general-32)**|General group|
141
141
|**[KNOWN-CVES](#crs800-32)**|Help detect new and known CVEs|
@@ -160,7 +160,7 @@ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group con
160
160
> [!NOTE]
161
161
> CRS 3.1 is only available on the WAF_v2 SKU.
162
162
163
-
|Rule group|Description|
163
+
|Rule group name|Description|
164
164
|---|---|
165
165
|**[General](#general-31)**|General group|
166
166
|**[KNOWN-CVES](#crs800-31)**|Help detect new and known CVEs|
@@ -181,7 +181,7 @@ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group con
181
181
182
182
CRS 3.0 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled. The ruleset is based off OWASP CRS 3.0.0 version.
183
183
184
-
|Rule group|Description|
184
+
|Rule group name|Description|
185
185
|---|---|
186
186
|**[General](#general-30)**|General group|
187
187
|**[KNOWN-CVES](#crs800-30)**|Help detect new and known CVEs|
@@ -204,7 +204,7 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
204
204
> [!NOTE]
205
205
> CRS 2.2.9 is no longer supported for new WAF policies. We recommend you upgrade to the latest CRS version. CRS 2.2.9 can't be used along with CRS 3.2/DRS 2.1 and greater versions.
206
206
207
-
|Rule group|Description|
207
+
|Rule group name|Description|
208
208
|---|---|
209
209
|**[crs_20_protocol_violations](#crs20)**|Protect against protocol violations (such as invalid characters or a GET with a request body)|
210
210
|**[crs_21_protocol_anomalies](#crs21)**|Protect against incorrect header information|
@@ -221,7 +221,7 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
221
221
222
222
You can enable a managed bot protection rule set to take custom actions on requests from all bot categories.
0 commit comments