

If a request matches a custom rule, the corresponding rule action is applied. Additionally, custom rules can be configured in the same WAF policy if you wish to bypass any of the pre-configured rules in the Core Rule Set.Ĭustom rules are always applied before rules in the Core Rule Set are evaluated. For more information, see Web Application Firewall (WAF) with Application Gateway exclusion lists.īy default, DRS version 2.1 / CRS version 3.2 and above will leverage anomaly scoring when a request matches a rule, CRS 3.1 and below will block matching requests by default. Exclusion rules apply to your whole web application. You can configure exclusions to apply when specific WAF rules are evaluated, or to apply globally to the evaluation of all WAF rules. A common example is Active Directory-inserted tokens that are used for authentication. Sometimes you might need to omit certain request attributes from a WAF evaluation. The Bot Manager ruleset supports the allow, block and log actions. The DRS/CRS supports block, log and anomaly score actions. You can also set specific actions per rule. You can disable or enable individual rules within the Managed Rule Set to meet your application requirements.


Common application misconfigurations (for example, Apache and IIS)īoth DRS and CRS are enabled by default in Detection mode in your WAF policies.HTTP protocol anomalies, such as missing host user-agent and accept headers.Other common attacks, such as command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion.The WAF protects against the following web vulnerabilities: Learn more about the new Azure WAF engine. You can also customize rules to suit your needs. The Application Gateway WAF comes pre-configured with CRS 3.2 by default, but you can choose to use any other supported CRS version.ĬRS 3.2 offers a new engine and new rule sets defending against Java injections, an initial set of file upload checks, and fewer false positives compared with earlier versions of CRS. Keep the rule enabled to prevent against SpringShell vulnerabilityĪttempted Spring Cloud routing-expression injection CVE-2022-22963Īttempted Spring Framework unsafe class object exploitation CVE-2022-22965Īttempted Spring Cloud Gateway Actuator injection CVE-2022-22947 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12) SQL Injection Attack: Common Injection Testing Detectedĭetects basic SQL authentication bypass attempts 2/3 We suggest you to disable some of the rules while you get started with 2.1 on Application Gateway WAF. The Microsoft Threat Intelligence Collection rules are written in partnership with the Microsoft Threat Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction. Microsoft Threat Intelligence Collection rules The version number of the DRS increments when new attack signatures are added to the rule set. The Azure-managed Default Rule Set (DRS) includes rules against the following threat categories: In the rare occasion that a published ruleset needs to be updated, it will be documented here. This article contains the current rules and rule sets offered. Rules can be disabled on a rule-by-rule basis, or you can set specific actions by individual rule. Default rule set also includes the Microsoft Threat Intelligence Collection rules that are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction.Ĭustomers also have the option of using rules that are defined based on the OWASP core rule sets 3.2, 3.1, 3.0, or 2.2.9. Since such rule sets are managed by Azure, the rules are updated as needed to protect against new attack signatures. Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Application Gateway web application firewall (WAF) protects web applications from common vulnerabilities and exploits.
