Skip to content

Commit 1d47c5b

Browse files
authored
Merge pull request #312075 from halkazwini/waf-policy
Ruleset support policy
2 parents df89d23 + b2a904e commit 1d47c5b

3 files changed

Lines changed: 180 additions & 3 deletions

File tree

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-web-application-firewall
88
ms.topic: concept-article
9-
ms.date: 02/16/2026
9+
ms.date: 02/26/2026
1010
ms.custom: build-2025
1111

1212
# Customer intent: "As a web application security administrator, I want to manage DRS and CRS rule sets in the web application firewall, so that I can customize security settings and protect against a broad range of vulnerabilities effectively."
@@ -1177,7 +1177,7 @@ Below are previous Core Rule Set versions. If you're using CRS 3.2, CRS 3.1, CRS
11771177
|942460|Warning - 3|PL3|(Inactive rule, should be ignored) Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters|
11781178
|942490|Critical - 5|PL3|(Inactive rule, should be ignored) Detects classic SQL injection probings 3/3|
11791179

1180-
# [OWASP 3.1 (legacy)](#tab/owasp31)
1180+
# [OWASP 3.1 (support end date set)](#tab/owasp31)
11811181

11821182
## <a name="owasp31"></a> 3.1 rule sets
11831183

@@ -1437,7 +1437,7 @@ Below are previous Core Rule Set versions. If you're using CRS 3.2, CRS 3.1, CRS
14371437
|944240|Remote Command Execution: Java serialization and Log4j vulnerability ([CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))|
14381438
|944250|Remote Command Execution: Suspicious Java method detected|
14391439

1440-
# [OWASP 3.0 - no longer supported](#tab/owasp30)
1440+
# [OWASP 3.0 (support end date set)](#tab/owasp30)
14411441

14421442
## <a name="owasp30"></a> 3.0 rule sets
14431443

Lines changed: 173 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,173 @@
1+
---
2+
title: Managed Ruleset Support Policy
3+
titleSuffix: Azure Web Application Firewall
4+
description: Learn about Azure WAF's managed ruleset support policy, including supported versions, upgrade recommendations, and extended support timelines.
5+
author: halkazwini
6+
ms.author: halkazwini
7+
ms.service: azure-web-application-firewall
8+
ms.topic: concept-article
9+
ms.date: 02/26/2026
10+
zone_pivot_groups: web-application-firewall-types
11+
12+
#customer intent: As an IT admin, I want to understand the Azure WAF managed ruleset support policy so that I can ensure my applications remain secure and compliant.
13+
---
14+
15+
# Azure Web Application Firewall managed ruleset support policy
16+
17+
::: zone pivot="application-gateway"
18+
19+
Azure Web Application Firewall supports a defined set of managed ruleset versions to ensure strong security protections, predictable behavior, and a clear upgrade path for customers. Azure manages the Default Rule Set (DRS), selected Core Rule Set (CRS) versions, Bot Management and HTTP DDoS rulesets, and periodically releases new rule set versions that include new protections, updated signatures, and rule improvements.
20+
21+
::: zone-end
22+
23+
::: zone pivot="front-door"
24+
25+
Azure Web Application Firewall supports a defined set of managed ruleset versions to ensure strong security protections, predictable behavior, and a clear upgrade path for customers. Azure manages the Default Rule Set (DRS), Bot Management, and HTTP DDoS rulesets versions and periodically releases new rule set versions that include new protections, updated signatures, and rule improvements.
26+
27+
::: zone-end
28+
29+
## Supported versions
30+
31+
Starting February 2026, Azure WAF actively **supports the latest three ruleset releases** in the following format:
32+
33+
34+
- **N:** Latest available rule set version (for example, **DRS 2.2**)
35+
36+
- **N-1:** Previous rule set version (for example, **DRS 2.1**)
37+
38+
::: zone pivot="application-gateway"
39+
40+
- **N-2:** Second previous rule set version (for example, **CRS 3.2**)
41+
42+
::: zone-end
43+
44+
::: zone pivot="front-door"
45+
46+
- **N-2:** Second previous rule set version (for example, **DRS 2.0**)
47+
48+
::: zone-end
49+
50+
Only **N, N-1, and N-2 versions** are supported for general use and receive ongoing updates, improvements, and rule tuning from the Azure WAF team.
51+
52+
## Extended support for older rule sets
53+
54+
When a newer rule set version (**N**) is released to general availability, the ruleset that becomes **N-3** will enter a **final support phase**:
55+
56+
::: zone pivot="application-gateway"
57+
58+
- Once the newer ruleset version (N) is released, new Azure WAF policies can't be created with the **N-3** version, and any existing WAF policies with the N-3 version can't be attached.
59+
60+
::: zone-end
61+
62+
::: zone pivot="front-door"
63+
64+
- Once the newer ruleset version (N) is released, new Azure WAF policies can't be created with the **N-3** version.
65+
66+
::: zone-end
67+
68+
- The **N-3 version continues to be supported for 12 months** from the release date of the new **N** rule set, for existing WAF policies only. During these 12 months period, the N-3 version is eligible to receive **only critical security updates**.
69+
70+
- After the 12-month period, the N-3 version will no longer be supported. It won't receive any further updates, fixes, or support from the support team.
71+
72+
This rolling support window helps ensure that users have ample time to plan and migrate to supported versions while maintaining a clear lifecycle for managed rule sets.
73+
74+
## Upgrade recommendations
75+
76+
Users are encouraged to:
77+
78+
- Use the **latest rule set version (N)** where possible to benefit from the most current protections and rule coverage.
79+
80+
- Plan upgrades early, taking advantage of the **12-month final support period** for older rule sets.
81+
82+
::: zone pivot="application-gateway"
83+
84+
- Review [Upgrade CRS or DRS ruleset version](/azure/web-application-firewall/ag/upgrade-ruleset-version) for breaking changes, added rules, and tuning guidance when moving between major rule set versions.
85+
86+
::: zone-end
87+
88+
> [!WARNING]
89+
> Failure to upgrade beyond the final support period might expose applications to unpatched vulnerabilities and reduced managed rule coverage.
90+
91+
## Ruleset support schedule
92+
93+
::: zone pivot="application-gateway"
94+
95+
The following tables summarize the current support status and planned end of support dates for managed rulesets of Azure WAF on Application Gateway:
96+
97+
::: zone-end
98+
99+
::: zone pivot="front-door"
100+
101+
The following tables summarize the current support status and planned end of support dates for managed rulesets of Azure WAF on Front Door:
102+
103+
::: zone-end
104+
105+
### Default rulesets
106+
107+
::: zone pivot="application-gateway"
108+
109+
| **Ruleset version** | **Release date** | **Support status** | **Support end date** |
110+
|---|---|---|---|
111+
| **DRS 2.2** | February 2026 | Supported | Not defined yet |
112+
| **DRS 2.1** | October 2023 | Supported | Not defined yet |
113+
| **CRS 3.2** | August 2021 | Supported | Not defined yet. Support ends one year after the release of the **first** DRS version newer than DRS 2.2 |
114+
| **CRS 3.1** <br> **CRS 3.0** | N/A | Supported | February 26, 2027 |
115+
| **CRS 2.2.9** | N/A | Not supported | March 15, 2025 |
116+
117+
::: zone-end
118+
119+
::: zone pivot="front-door"
120+
121+
| **Ruleset version** | **Release date** | **Support status** | **Support end date** |
122+
|---|---|---|---|
123+
| **DRS 2.2** | February 2026 | Supported | Not defined yet |
124+
| **DRS 2.1** | October 2023 | Supported | Not defined yet |
125+
| **DRS 2.0** | August 2021 | Supported | Not defined yet. Support ends one year after the release of the **first** DRS version newer than DRS 2.2 |
126+
| **DRS 1.2** <br> **DRS 1.1** <br> **DRS 1.0** | N/A | Supported | February 26, 2027 |
127+
128+
::: zone-end
129+
130+
### Bot management ruleset
131+
132+
::: zone pivot="application-gateway"
133+
134+
| **Ruleset version** | **Release date** | **Support status** | **Support end date** |
135+
|----|----|----|----|
136+
| **Bot Management 1.1** | October 2024 | Supported | Not defined yet |
137+
| **Bot Management 1.0** | July 2021 | Supported | Not defined yet |
138+
| **Bot Management 0.1** | N/A | Not supported | Preview version - not supported |
139+
140+
### HTTP DDoS ruleset
141+
142+
| **Ruleset version** | **Release date** | **Support status** | **Support end date** |
143+
|----|----|----|----|
144+
| **HTTP DDoS Ruleset 1.0** | November 2025 | Supported | Not defined yet |
145+
146+
::: zone-end
147+
148+
::: zone pivot="front-door"
149+
150+
| **Ruleset version** | **Release date** | **Support status** | **Support end date** |
151+
|----|----|----|----|
152+
| **Bot Management 1.1** | October 2024 | Supported | Not defined yet |
153+
| **Bot Management 1.0** | July 2021 | Supported | Not defined yet |
154+
155+
::: zone-end
156+
157+
## Related content
158+
159+
::: zone pivot="application-gateway"
160+
161+
- [DRS and CRS rule groups and rules](/azure/web-application-firewall/ag/application-gateway-crs-rulegroups-rules)
162+
- [Upgrade CRS or DRS ruleset version](/azure/web-application-firewall/ag/upgrade-ruleset-version)
163+
- [Customize WAF rules](/azure/web-application-firewall/ag/application-gateway-customize-waf-rules-portal)
164+
165+
::: zone-end
166+
167+
::: zone pivot="front-door"
168+
169+
- [DRS rule groups and rules](/azure/web-application-firewall/afds/waf-front-door-drs)
170+
- [WAF exclusion lists](/azure/web-application-firewall/afds/waf-front-door-exclusion)
171+
172+
::: zone-end
173+

articles/web-application-firewall/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ items:
7474
items:
7575
- name: Overview
7676
href: ./ag/application-gateway-crs-rulegroups-rules.md
77+
- name: Managed ruleset support policy
78+
href: ruleset-support-policy.md?pivots=application-gateway
7779
- name: Exclusion lists
7880
href: ./ag/application-gateway-waf-configuration.md
7981
- name: Upgrade ruleset version
@@ -126,6 +128,8 @@ items:
126128
items:
127129
- name: Overview
128130
href: ./afds/waf-front-door-drs.md
131+
- name: Managed ruleset support policy
132+
href: ruleset-support-policy.md?pivots=front-door
129133
- name: Exclusion lists
130134
href: ./afds/waf-front-door-exclusion.md
131135
- name: Configure exclusion lists

0 commit comments

Comments
 (0)