


When you use CRS, your WAF is configured to use anomaly scoring by default. No other custom rules or the rules in the Core Rule Set are processed. The request is either blocked or passed through to the back-end. If a request matches a custom rule, the corresponding rule action is applied. Additionally, custom rules can be configured in the same WAF policy if you wish to bypass any of the pre-configured rules in the Core Rule Set.Ĭustom rules are always applied before rules in the Core Rule Set are evaluated. For more information, see Web Application Firewall (WAF) with Application Gateway exclusion lists.īy default, CRS version 3.2 and above will leverage anomaly scoring when a request matches a rule, CRS 3.1 and below will block matching requests by default. Exclusion rules apply to your whole web application. You can configure exclusions to apply when specific WAF rules are evaluated, or to apply globally to the evaluation of all WAF rules. A common example is Active Directory-inserted tokens that are used for authentication. Sometimes you might need to omit certain request attributes from a WAF evaluation. The Bot Manager ruleset supports the allow, block and log actions. The CRS supports block, log and anomaly score actions.

You can also set specific actions per rule. You can disable or enable individual rules within the Core Rule Set to meet your application requirements.
