The self-managed rules feature offers a lot of flexibility in defining the trigger conditions for activating rules within users' applications. Users can specify the circumstances under which the rule's actions or protections should be applied. One practical example is the use of a custom rule to avoid cookie validation and reduce false positives. In cases where strict cookie validation may lead to legitimate user requests being flagged as suspicious, users can create a custom rule with appropriate configurations. By configuring the rule action to "Allow" and setting specific criteria such as request parameter and comparing value, you can ensure that the rule skips the validation process for selected arguments, whitelisting them and preventing false positive detections.
AppTrana's self-managed rules a a realrely valuable feature. They empower users to develop custom rules that perfectly align with the unique architecture, functionality, and business logic of a company's web application. By enabling users to take charge of rule creation and configuration, they no longer have to rely solely on their managed security team. This self-service mode allows users to provide a descriptive name and comprehensive description for each custom rule, ensuring clarity and easy management. Additionally, the fail-safe range parameter ensures that any user-added rule doesn't disrupt the behavior of the Web Application Firewall (WAF) by automatically moving the rules to "log-only" mode if the blocked requests exceed the expected percentage.
Find out what your peers are saying about Indusface, Cloudflare, Amazon Web Services (AWS) and others in Web Application Firewall (WAF). Updated: November 2024.
What is a web application firewall (WAF)? A web application firewall, or WAF, helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet.
The self-managed rules feature offers a lot of flexibility in defining the trigger conditions for activating rules within users' applications. Users can specify the circumstances under which the rule's actions or protections should be applied. One practical example is the use of a custom rule to avoid cookie validation and reduce false positives. In cases where strict cookie validation may lead to legitimate user requests being flagged as suspicious, users can create a custom rule with appropriate configurations. By configuring the rule action to "Allow" and setting specific criteria such as request parameter and comparing value, you can ensure that the rule skips the validation process for selected arguments, whitelisting them and preventing false positive detections.
AppTrana's self-managed rules a a realrely valuable feature. They empower users to develop custom rules that perfectly align with the unique architecture, functionality, and business logic of a company's web application. By enabling users to take charge of rule creation and configuration, they no longer have to rely solely on their managed security team. This self-service mode allows users to provide a descriptive name and comprehensive description for each custom rule, ensuring clarity and easy management. Additionally, the fail-safe range parameter ensures that any user-added rule doesn't disrupt the behavior of the Web Application Firewall (WAF) by automatically moving the rules to "log-only" mode if the blocked requests exceed the expected percentage.