Skip to content

Commit d9ec24b

Browse files
committed
acrolinx tweaks
1 parent 788c1a5 commit d9ec24b

1 file changed

Lines changed: 10 additions & 10 deletions

File tree

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-web-application-firewall
88
ms.topic: concept-article
9-
ms.date: 09/17/2025
9+
ms.date: 01/29/2026
1010
ms.custom: build-2025
1111

1212
# Customer intent: "As a web application security administrator, I want to manage DRS and CRS rule sets in the web application firewall, so that I can customize security settings and protect against a broad range of vulnerabilities effectively."
@@ -23,7 +23,7 @@ You can disable rules individually, or set specific actions for each rule. This
2323
2424
## Default rule set 2.2
2525

26-
Default rule set (DRS) 2.2 is based on Open Web Application Security Project (OWASP) Core Rule Set 3.3.4, bringing refinements to existing detections and new protections, including rules that detect content types declared outside the actual content-type header and enhanced remote code execution (RCE) detections. DRS 2.2 includes additional proprietary protections rules developed by Microsoft Threat Intelligence team which expand coverage across SQL injection, XSS, and application-security attack patterns.
26+
Default rule set (DRS) 2.2 is based on Open Web Application Security Project (OWASP) Core Rule Set 3.3.4, bringing refinements to existing detections and new protections, including rules that detect content types declared outside the actual content-type header and enhanced remote code execution (RCE) detections. DRS 2.2 includes additional proprietary protections rules developed by Microsoft Threat Intelligence team, which expand coverage across SQL injection, XSS, and application-security attack patterns.
2727

2828
DRS 2.2 offers a new engine and new rule sets defending against Java injections, an initial set of file upload checks, and fewer false positives compared with older DRS and CRS versions. You can also [customize rules to suit your needs](application-gateway-customize-waf-rules-portal.md). Learn more about the new [Azure WAF engine](waf-engine.md).
2929

@@ -59,7 +59,7 @@ Some OWASP rules are superseded by Microsoft-authored replacements. The original
5959

6060
## Default rule set 2.1
6161

62-
While you can still use default rule set (DRS) 2.1, it is recommended to use the latest version of DRS 2.2.
62+
While you can still use default rule set (DRS) 2.1, it's recommended to use the latest version of DRS 2.2.
6363

6464
Default rule set (DRS) 2.1 is baselined off the Open Web Application Security Project (OWASP) Core Rule Set (CRS) 3.3.2 and includes additional proprietary protections rules developed by Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.
6565

@@ -145,7 +145,7 @@ Each rule is assigned in a specific Paranoia Level (PL). Rules configured in Par
145145
By default, DRS 2.2 is configured at Paranoia Level 1 (PL1), and all PL2 rules are disabled. To run WAF at PL2, you can manually enable any or all PL2 rules.
146146
For earlier rule sets, DRS 2.1 and CRS 3.2 include rules defined for Paranoia Level 2, which covers both PL1 and PL2 rules. If you prefer to operate strictly at PL1, you can disable specific PL2 rules or set their action to Log.
147147

148-
Paranoia Levels 3 and 4 are not currently supported in Azure WAF.
148+
Paranoia Levels 3 and 4 aren't currently supported in Azure WAF.
149149

150150
> [!NOTE]
151151
> CRS 3.2 ruleset includes rules in PL3 and PL4, but these rules are always inactive and can't be enabled, regardless of their configured state or action.
@@ -193,7 +193,7 @@ The following rule groups and rules are available when using Web Application Fir
193193
### <a name="drs911-22"></a> Method enforcement
194194
|Rule ID|Anomaly score severity|Paranoia Level|Description|
195195
|---|---|--|--|
196-
|911100|Critical - 5|1|Method is not allowed by policy|
196+
|911100|Critical - 5|1|Method isn't allowed by policy|
197197

198198

199199
### <a name="drs920-22"></a> Protocol enforcement
@@ -202,7 +202,7 @@ The following rule groups and rules are available when using Web Application Fir
202202
|920100|Notice - 2|1|Invalid HTTP Request Line|
203203
|920120|Critical - 5|1|Attempted multipart/form-data bypass|
204204
|920121|Critical - 5|2|Attempted multipart/form-data bypass|
205-
|920160|Critical - 5|1|Content-Length HTTP header is not numeric.|
205+
|920160|Critical - 5|1|Content-Length HTTP header isn't numeric.|
206206
|920170|Critical - 5|1|GET or HEAD Request with Body Content.|
207207
|920171|Critical - 5|1|GET or HEAD Request with Transfer-Encoding.|
208208
|920180|Notice - 2|1|POST without Content-Length or Transfer-Encoding headers.|
@@ -366,7 +366,7 @@ The following rule groups and rules are available when using Web Application Fir
366366
|942240|Critical - 5|1|Detects MySQL charset switch and MSSQL DoS attempts|
367367
|942250|Critical - 5|1|Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections|
368368
|942260|Critical - 5|2|Detects basic SQL authentication bypass attempts 2/3 (replaced by rule #99031004)|
369-
|942270|Critical - 5|1|Looking for basic sql injection. Common attack string for mysql, oracle and others.|
369+
|942270|Critical - 5|1|Looking for basic sql injection. Common attack string for MySQL, Oracle, and others.|
370370
|942280|Critical - 5|1|Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts|
371371
|942290|Critical - 5|1|Finds basic MongoDB SQL injection attempts|
372372
|942300|Critical - 5|2|Detects MySQL comments, conditions and ch(a)r injections|
@@ -1284,7 +1284,7 @@ Below are previous Core Rule Set versions. If you're using CRS 3.2, CRS 3.1, CRS
12841284
|942251|Detects HAVING injections|
12851285
|942260|Detects basic SQL authentication bypass attempts 2/3|
12861286
|942270|Looking for basic sql injection. Common attack string for mysql oracle and others|
1287-
|942280|Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts|
1287+
|942280|Detects Postgres pg_sleep injection, waitfor delay attacks, and database shutdown attempts|
12881288
|942290|Finds basic MongoDB SQL injection attempts|
12891289
|942300|Detects MySQL comments, conditions, and ch(a)r injections|
12901290
|942310|Detects chained SQL injection attempts 2/2|
@@ -1524,10 +1524,10 @@ Below are previous Core Rule Set versions. If you're using CRS 3.2, CRS 3.1, CRS
15241524
|942220|Looking for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 is the \"magic number\" crash'|
15251525
|942230|Detects conditional SQL injection attempts|
15261526
|942240|Detects MySQL charset switch and MSSQL DoS attempts|
1527-
|942250|Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections|
1527+
|942250|Detects MATCH AGAINST, MERGE, and EXECUTE IMMEDIATE injections|
15281528
|942260|Detects basic SQL authentication bypass attempts 2/3|
15291529
|942270|Looking for basic sql injection. Common attack string for mysql oracle and others|
1530-
|942280|Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts|
1530+
|942280|Detects Postgres pg_sleep injection, waitfor delay attacks, and database shutdown attempts|
15311531
|942290|Finds basic MongoDB SQL injection attempts|
15321532
|942300|Detects MySQL comments, conditions, and ch(a)r injections|
15331533
|942310|Detects chained SQL injection attempts 2/2|

0 commit comments

Comments
 (0)