Skip to content

Managed Rules

Response: Policy Groups -> OWASP Basic Protection Rule Set

SQL Injection (SQLi): Block SQL injection attacks
Cross Site Scripting (XSS): Block cross-site scripting attacks
Local File Inclusion (LFI): Block attacks exploiting local file inclusion vulnerabilities
Remote File Inclusion (RFI): Block attacks exploiting remote file inclusion vulnerabilities
Remote Code Execution (RCE): Block attacks exploiting remote command execution vulnerabilities
PHP Code Injection: Block PHP code injection
HTTP Protocol Violations: Block malicious access that violates HTTP protocol
HTTPoxy: Block attacks exploiting remote proxy infection vulnerabilities
Shellshock: Block attacks exploiting Shellshock vulnerabilities
Session Fixation: Block attacks exploiting session ID fixation vulnerabilities
Scanner Detection: Block website scanning by hackers
Metadata/Error Leakages: Block source code/error information leakage
Project Honey Pot Blacklist: Honey pot project blacklist
GeoIP Country Blocking: Block IPs based on their geographical location

Adjust Variable Parameters Flexibly to Set Basic Protection Rules That Better Match Your Website Access Patterns


In **Rule Title**, select allowed HTTP versions. The parameter column shows supported parameters. Click **Edit** to view **Rule Description** and **Specific Rules** for each rule title


Click **Advanced Search**

In the **Rule List**, the default mode is **Enable**. There are three modes in the mode column that you can choose according to your needs

Recovery: Disable More Detailed Basic Protection Rule Items Through Basic Protection Rules

Go to **Web Application Firewall 3.0->Package List->Policy Groups->Basic Protection Rules->Advanced Search** to disable detailed rules