Add cookies, parameters and URLs
Cookie protections can be configured and managed directly within the policy editor by selecting the Cookies option.
Each cookie configuration includes:
Cookie Type
:Explicit
orWildcard
. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Cookie Name
: The name of the cookie to be monitored or protectedEnforcement Type
:- Allow: Specifies that this cookie may be changed by the client. The cookie is not protected from modification
- Enforce: Specifies that this cookie may not be changed by the client
Attack Signatures
: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicableMask value in logs
: When enabled, the cookie’s value will be masked in the request log for enhanced security and privacy
For a complete list of configurable cookie properties and options, see the Cookie Configuration Parameters documentation under the cookies
section.
Select Edit Configuration to configure cookie violations. The following violations can be configured for cookies:
VIOL_COOKIE_EXPIRED
: Triggered when a cookie’s timestamp is expiredVIOL_COOKIE_LENGTH
: Triggered when cookie length exceeds the configured limitVIOL_COOKIE_MALFORMED
: Triggered when cookies are not RFC-compliantVIOL_COOKIE_MODIFIED
: Triggered when domain cookies have been tampered with
For each violation type, you can:
- Set the enforcement action
- Toggle
Alarm
,Alarm and Block
, orDisabled
settings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose Cookie Type:
- Select either
Explicit
for exact cookie matching orWildcard
for pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the
Cookie Name
- Choose whether to mask the cookie value in logs
- Enter the
-
Set Enforcement Type:
- Choose either
Allow
orEnforce
- Choose either
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific cookie
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add Cookie to save your configuration
Parameter protections can be configured and managed directly within the policy editor by selecting the Parameters option.
Each parameter configuration includes:
Parameter Type
:Explicit
orWildcard
. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Parameter Name
: The name of the parameterLocation
: Where the parameter is expected (URL query string, POST data, etc.)Value Type
: The expected type of the parameter value (e.g., alpha-numeric, integer, email)Attack Signatures
: Whether attack signature checking is enabled for this parameterMask value in logs
: When enabled, the parameter’s value will be masked in the request log for enhanced security and privacy. This setssensitiveParameter
property of the parameter item.
For a complete list of configurable parameter properties and options, see the Parameter Configuration Parameters documentation under the parameters
section.
Select Edit Configuration to configure parameter violations. The following violations can be configured for parameters:
VIOL_PARAMETER
: Triggered when an illegal parameter is detectedVIOL_PARAMETER_ARRAY_VALUE
: Triggered when an array parameter value is illegalVIOL_PARAMETER_DATA_TYPE
: Triggered when parameter data type doesn’t match configured security policyVIOL_PARAMETER_EMPTY_VALUE
: Triggered when a parameter value is empty but shouldn’t beVIOL_PARAMETER_LOCATION
: Triggered when a parameter is found in wrong locationVIOL_PARAMETER_MULTIPART_NULL_VALUE
: Triggered when the multi-part request has a parameter value that contains the NULL character (0x00)VIOL_PARAMETER_NAME_METACHAR
: Triggered when illegal meta characters are found in parameter nameVIOL_PARAMETER_NUMERIC_VALUE
: Triggered when numeric parameter value is outside allowed rangeVIOL_PARAMETER_REPEATED
: Triggered when a parameter name is repeated illegallyVIOL_PARAMETER_STATIC_VALUE
: Triggered when a static parameter value doesn’t match configured security policyVIOL_PARAMETER_VALUE_BASE64
: Triggered when the value is not a valid Base64 stringVIOL_PARAMETER_VALUE_LENGTH
: Triggered when parameter value length exceeds limitsVIOL_PARAMETER_VALUE_METACHAR
: Triggered when illegal meta characters are found in parameter valueVIOL_PARAMETER_VALUE_REGEXP
: Triggered when parameter value doesn’t match required pattern
For each violation type, you can:
- Set the enforcement action
- Toggle
Alarm
,Alarm and Block
, orDisabled
settings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose Parameter Type:
- Select either
Explicit
for exact parameter matching orWildcard
for pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the parameter
Parameter Name
- Select the
Location
where the parameter is expected - Choose the
Value Type
(alpha-numeric, integer, email, etc.) - Set the
Data Type
if applicable
- Enter the parameter
-
Set Security Options:
- Choose whether to enable attack signatures
Attack Signatures are only applicable when the Value Type isUser Input
orArray
and the Data Type is eitherAlphanumeric
orBinary
- Decide if parameter value should be masked in logs which sets
sensitiveParameter
in Parameter Configuration Reference
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific parameter
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add Parameter to save your configuration
URL protections can be configured and managed directly within the policy editor by selecting the URLs option.
Each URL configuration includes:
URL Type
:Explicit
orWildcard
. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Method
: Specifies the HTTP method(s) for the URL (GET
,POST
,PUT
, etc.)Protocol
: The protocol for the URL (HTTP
/HTTPS
)Enforcement Type
:- Allow: Permits access to the URL with optional attack signature checks
- Disallow: Blocks access to the URL entirely
Attack Signatures
: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable
⚠️ Important: Attack Signatures are automatically shown as “Not Applicable” when Enforcement Type is set toDisallow
since the URL is explicitly blocked and signature checking is unnecessary.
For a complete list of configurable URL properties and options, see the URL Configuration Parameters documentation under the urls
section.
Select Edit Configuration to configure URL violations. The following violations can be configured for URLs:
VIOL_URL
: Triggered when an illegal URL is accessedVIOL_URL_CONTENT_TYPE
: Triggered when there’s an illegal request content typeVIOL_URL_LENGTH
: Triggered when URL length exceeds the configured limitVIOL_URL_METACHAR
: Triggered when illegal meta characters are found in the URL
For each violation type, you can:
- Set the enforcement action
- Toggle
Alarm
,Alarm and Block
, orDisabled
settings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose URL Type:
- Select either
Explicit
for exact URL matching orWildcard
for pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the
URL
path (e.g.,/index.html
,/api/data
)- The URL path must start with
/
- The URL path must start with
- Select HTTP
Method(s)
(e.g.,GET
,POST
, *) - Choose the
Protocol
(HTTP
/HTTPS
)
- Enter the
-
Set Enforcement:
- Choose whether to allow or disallow the URL
- If
Allow URL
is selected, you can optionally enable attack signatures
⚠️ Important: Attack signatures cannot be enabled for disallowed URLs. -
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific URL
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add URL to save your configuration