You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: halkazwini
6
6
ms.author: halkazwini
7
7
ms.service: azure-web-application-firewall
8
8
ms.topic: concept-article
9
-
ms.date: 09/17/2025
9
+
ms.date: 01/29/2026
10
10
ms.custom: build-2025
11
11
12
12
# Customer intent: "As a web application security administrator, I want to manage DRS and CRS rule sets in the web application firewall, so that I can customize security settings and protect against a broad range of vulnerabilities effectively."
@@ -23,7 +23,7 @@ You can disable rules individually, or set specific actions for each rule. This
23
23
24
24
## Default rule set 2.2
25
25
26
-
Default rule set (DRS) 2.2 is based on Open Web Application Security Project (OWASP) Core Rule Set 3.3.4, bringing refinements to existing detections and new protections, including rules that detect content types declared outside the actual content-type header and enhanced remote code execution (RCE) detections. DRS 2.2 includes additional proprietary protections rules developed by Microsoft Threat Intelligence team which expand coverage across SQL injection, XSS, and application-security attack patterns.
26
+
Default rule set (DRS) 2.2 is based on Open Web Application Security Project (OWASP) Core Rule Set 3.3.4, bringing refinements to existing detections and new protections, including rules that detect content types declared outside the actual content-type header and enhanced remote code execution (RCE) detections. DRS 2.2 includes additional proprietary protections rules developed by Microsoft Threat Intelligence team, which expand coverage across SQL injection, XSS, and application-security attack patterns.
27
27
28
28
DRS 2.2 offers a new engine and new rule sets defending against Java injections, an initial set of file upload checks, and fewer false positives compared with older DRS and CRS versions. You can also [customize rules to suit your needs](application-gateway-customize-waf-rules-portal.md). Learn more about the new [Azure WAF engine](waf-engine.md).
29
29
@@ -59,7 +59,7 @@ Some OWASP rules are superseded by Microsoft-authored replacements. The original
59
59
60
60
## Default rule set 2.1
61
61
62
-
While you can still use default rule set (DRS) 2.1, it is recommended to use the latest version of DRS 2.2.
62
+
While you can still use default rule set (DRS) 2.1, it's recommended to use the latest version of DRS 2.2.
63
63
64
64
Default rule set (DRS) 2.1 is baselined off the Open Web Application Security Project (OWASP) Core Rule Set (CRS) 3.3.2 and includes additional proprietary protections rules developed by Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding.
65
65
@@ -145,7 +145,7 @@ Each rule is assigned in a specific Paranoia Level (PL). Rules configured in Par
145
145
By default, DRS 2.2 is configured at Paranoia Level 1 (PL1), and all PL2 rules are disabled. To run WAF at PL2, you can manually enable any or all PL2 rules.
146
146
For earlier rule sets, DRS 2.1 and CRS 3.2 include rules defined for Paranoia Level 2, which covers both PL1 and PL2 rules. If you prefer to operate strictly at PL1, you can disable specific PL2 rules or set their action to Log.
147
147
148
-
Paranoia Levels 3 and 4 are not currently supported in Azure WAF.
148
+
Paranoia Levels 3 and 4 aren't currently supported in Azure WAF.
149
149
150
150
> [!NOTE]
151
151
> CRS 3.2 ruleset includes rules in PL3 and PL4, but these rules are always inactive and can't be enabled, regardless of their configured state or action.
@@ -193,7 +193,7 @@ The following rule groups and rules are available when using Web Application Fir
0 commit comments