Add cookies, parameters and urls
Cookies can be configured and managed directly within the policy editor by selecting the Cookies option.
Each cookie configuration includes:
Cookie Type
:Explicit
orWildcard
. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Cookie Name
: The name of the cookie to be monitored or protectedEnforcement Type
:- Allow: Permits the cookie with optional attack signature checks
- Disallow: Blocks the use of the cookie entirely
Attack Signatures
: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicableMask Value in Logs
: When enabled, the cookie’s value will be masked in the request log for enhanced security and privacy
⚠️ Important: Attack Signatures are automatically set to “Not Applicable” when Enforcement Type is set to Disallow
since the URL is explicitly blocked and signature checking is unnecessary.
For a complete list of configurable cookie properties and options, see the Cookie Configuration Parameters documentation under the cookies
section.
Click on Edit Configuration to configure cookie violations. The following violations can be configured for cookies:
VIOL_COOKIE_EXPIRED
: Triggered when a cookie’s timestamp is expiredVIOL_COOKIE_LENGTH
: Triggered when cookie length exceeds the configured limitVIOL_COOKIE_MALFORMED
: Triggered when cookies are not RFC-compliantVIOL_COOKIE_MODIFIED
: Triggered when domain cookies have been tampered with
For each violation type, you can:
- Set the enforcement action
- Toggle
alarm
andblock
settings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose Cookie Type:
- Select either
Explicit
for exact cookie matching orWildcard
for pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the
Cookie Name
- Choose whether to mask the cookie value in logs
- Enter the
-
Set Enforcement:
- Choose whether to allow or disallow the cookie
- If
Allow Cookie
is selected, you can optionally enable attack signatures - ⚠️ Important: Attack signatures cannot be enabled for disallowed cookies.
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific cookie
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add Cookie to save your configuration
Parameters can be configured and managed directly within the policy editor by selecting the Parameters option.
Each parameter configuration includes:
Parameter Type
:Explicit
orWildcard
. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Name
: The name of the parameterLocation
: Where the parameter is expected (URL query string, POST data, etc.)Value Type
: The expected type of the parameter value (e.g., alpha-numeric, integer, email)Attack Signatures
: Whether attack signature checking is enabled for this parameterMask Value in Logs
: When enabled, the parameter’s value will be masked in the request log for enhanced security and privacy
For a complete list of configurable cookie properties and options, see the Parameter Configuration Parameters documentation under the parameters
section.
Select Edit Configuration to configure parameter violations. The following violations can be configured for parameters:
VIOL_PARAMETER
: Triggered when an illegal parameter is detectedVIOL_PARAMETER_ARRAY_VALUE
: Triggered when an array parameter value is illegalVIOL_PARAMETER_DATA_TYPE
: Triggered when parameter data type doesn’t match configurationVIOL_PARAMETER_EMPTY_VALUE
: Triggered when a parameter value is empty but shouldn’t beVIOL_PARAMETER_LOCATION
: Triggered when a parameter is found in wrong locationVIOL_PARAMETER_NAME_METACHAR
: Triggered when illegal meta characters are found in parameter nameVIOL_PARAMETER_NUMERIC_VALUE
: Triggered when numeric parameter value is outside allowed rangeVIOL_PARAMETER_REPEATED
: Triggered when a parameter name is repeated illegallyVIOL_PARAMETER_STATIC_VALUE
: Triggered when a static parameter value doesn’t match configurationVIOL_PARAMETER_VALUE_LENGTH
: Triggered when parameter value length exceeds limitsVIOL_PARAMETER_VALUE_METACHAR
: Triggered when illegal meta characters are found in parameter valueVIOL_PARAMETER_VALUE_REGEXP
: Triggered when parameter value doesn’t match required pattern
For each violation type, you can:
- Set the enforcement action
- Toggle
alarm
andblock
settings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose Parameter Type:
- Select either
Explicit
for exact parameter matching orWildcard
for pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the parameter
Name
- Select the
Location
where the parameter is expected - Choose the
Value Type
(alpha-numeric, integer, email, etc.) - Set the
Data Type
if applicable
- Enter the parameter
-
Set Security Options:
- Choose whether to enable attack signatures
- Decide if parameter value should be masked in logs which sets
sensitiveParameter
in Parameter Configuration Reference
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific parameter
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add Parameter to save your configuration
URLs can be configured and managed directly within the policy editor by selecting the URLs option.
Each URL configuration includes:
URL Type
:Explicit
orWildcard
. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Method
: Specifies which HTTP methods are allowed (GET
,POST
,PUT
, etc.)Protocol
: The protocol for the URL (HTTP
/HTTPS
)Enforcement Type
:- Allow: Permits access to the URL with optional attack signature checks
- Disallow: Blocks access to the URL entirely
Attack Signatures
: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable
⚠️ Important: Attack Signatures are automatically set to “Not Applicable” when Enforcement Type is set to Disallow
since the URL is explicitly blocked and signature checking is unnecessary.
For a complete list of configurable URL properties and options, see the URL Configuration Parameters documentation under the urls
section.
Select Edit Configuration to configure URL violations. The following violations can be configured for URLs:
VIOL_URL
: Triggered when an illegal URL is accessedVIOL_URL_CONTENT_TYPE
: Triggered when there’s an illegal request content typeVIOL_URL_LENGTH
: Triggered when URL length exceeds the configured limitVIOL_URL_METACHAR
: Triggered when illegal meta characters are found in the URL
For each violation type, you can:
- Set the enforcement action
- Toggle
alarm
andblock
settings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose URL Type:
- Select either
Explicit
for exact URL matching orWildcard
for pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the
URL
path - Select allowed
Method(s)
(e.g.,GET
,POST
, *) - Choose the
Protocol
(HTTP
/HTTPS
)
- Enter the
-
Set Enforcement:
- Choose whether to allow or disallow the URL
- If
Allow URL
is selected, you can optionally enable attack signatures - ⚠️ Important: Attack signatures cannot be enabled for disallowed URLs.
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific URL
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add URL to save your configuration