Generally Available: Default Ruleset 2.2 in WAF for Azure Application Gateway
Share
Services
Announcing the general availability of Default Rule Set (DRS) 2.2 for Web Application Firewall on Azure Application Gateway.
The Azure-managed DRS provides active protection against common web vulnerabilities and exploits. It also includes Microsoft Threat Intelligence collection rules, authored in collaboration with our intelligence teams, to deliver broader coverage, targeted vulnerability mitigations, and continual improvements in false-positive reduction.
DRS 2.2 is based on OWASP Core Rule Set 3.3.4, bringing refinements to existing detections and new protections, including rules that detect content types declared outside the actual content-type header and enhanced remote code execution (RCE) detections. An additional eight Microsoft Threat Intelligence rules expand coverage across SQL injection, XSS, and application-security attack patterns.
To significantly reduce legitimate traffic being blocked, DRS 2.2 ships at Paranoia Level (PL) 1 by default. PL1 includes high-signal, lower-noise rules that rarely trigger false positives. PL2 rules are disabled by default because they are more aggressive and typically require fine-tuning. You can keep PL2 disabled or selectively enable individual PL2 rules where warranted.
[Learn more](https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/application-gateway-crs-rulegroups-rules?tabs=drs22%2Cowasp32#default-rule-set-22).
What else is happening at Microsoft Azure?
Public Preview: X-Forwarded-For (XFF) grouping for rate limiting on Application Gateway WAF v2
about 4 hours ago
Services
Share
Read update
Services
Share
Public Preview: Azure NetApp Files support in OpenShift Virtualization
January 27th, 2026
Services
Share
Generally Available: Reporting in Playwright Workspaces (part of Azure App Testing)
January 22nd, 2026
Services
Share