Skip to content

Commit d20bb17

Browse files
Merge pull request #311216 from brandonhuntL7/patch-1
Fix links in disabled rules section
2 parents edfc81d + 35baeca commit d20bb17

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ DRS 2.2 includes 18 rule groups, as shown in the following table. Each group con
5252

5353

5454
#### Disabled rules
55-
DRS 2.2 rules configured in Paranoia Level 2 are disabled by default. You can leave their state as disabled if you wish to keep you WAF policy configured in Paranoia Level 1. If you wish to increase the policy's paranoia level, you can safely change these rules' state to enabled and their action to log mode. Analyze the logs, make the required fine tuning and enable the rules accordingly. For more information, see [#paranoia-level](Paranoia level) and [#tuning-of-managed-rule-sets](Tuning of managed rule sets)
55+
DRS 2.2 rules configured in Paranoia Level 2 are disabled by default. You can leave their state as disabled if you wish to keep you WAF policy configured in Paranoia Level 1. If you wish to increase the policy's paranoia level, you can safely change these rules' state to enabled and their action to log mode. Analyze the logs, make the required fine tuning and enable the rules accordingly. For more information, see [Paranoia level](?tabs=drs22%2Cowasp32#paranoia-level) and [Tuning of managed rule sets](?tabs=drs22%2Cowasp32#tuning-of-managed-rule-sets).
5656

5757
Some OWASP rules are superseded by Microsoft-authored replacements. The original rules are disabled by default and their descriptions end with “(replaced by …)”.
5858

0 commit comments

Comments
 (0)