Skip to content

Commit 881f69a

Browse files
committed
docs: Freshness review for idps-signature-categories.md
- Updated ms.date to 12/31/2025 - Verified all IDPS signature categories current - Confirmed 50+ categories and override behavior documentation accurate - Validated link to premium-features.md
1 parent 2a397b7 commit 881f69a

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

articles/firewall/idps-signature-categories.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: duongau
55
ms.service: azure-firewall
66
services: firewall
77
ms.topic: overview
8-
ms.date: 12/15/2021
8+
ms.date: 12/31/2025
99
ms.author: duau
1010
# Customer intent: "As a security analyst, I want to understand the Azure Firewall IDPS signature rule categories, so that I can effectively monitor and mitigate potential threats within my network."
1111
---
@@ -25,7 +25,7 @@ You can override the action for most IDPS signatures to Off, Alert, or Deny. Som
2525

2626
|Category |Description |
2727
|---------|---------|
28-
|3CORESec|This category is for signatures that are generated automatically from the 3CORESec team’s IP blocklists. These blocklists are generated by 3CORESec based on malicious activity from their Honeypots.|
28+
|3CORESec|This category is for signatures that are generated automatically from the 3CORESec team’s IP block lists. These blocklists are generated by 3CORESec based on malicious activity from their Honeypots.|
2929
|ActiveX|This category is for signatures that protect against attacks against Microsoft ActiveX controls and exploits targeting vulnerabilities in ActiveX controls.|
3030
|Adware-PUP|This category is for signatures to identify software that is used for ad tracking or other types of spyware related activity.|
3131
|Attack Response|This category is for signatures to identify responses indicative of intrusion—examples include but not limited to LMHost file download, presence of certain web banners and the detection of Metasploit Meterpreter kill command. These signatures are designed to catch the results of a successful attack. Things like *ID=root*, or error messages that indicate a compromise might have happened.|

0 commit comments

Comments
 (0)