Add cookies, parameters and URLs
Cookie protections can be configured and managed directly within the policy editor by selecting the Cookies option.
Each cookie configuration includes:
- Cookie Type:- Explicitor- Wildcard. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.
- Cookie Name: The name of the cookie to be monitored or protected
- Enforcement Type:- Allow: Specifies that this cookie may be changed by the client. The cookie is not protected from modification
- Enforce: Specifies that this cookie may not be changed by the client
 
- Attack Signatures: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable
- Mask value in logs: When enabled, the cookie’s value will be masked in the request log for enhanced security and privacy
For a complete list of configurable cookie properties and options, see the Cookie Configuration Parameters documentation under the cookies section.
Select Edit Configuration to configure cookie violations. The following violations can be configured for cookies:
- VIOL_COOKIE_EXPIRED: Triggered when a cookie’s timestamp is expired
- VIOL_COOKIE_LENGTH: Triggered when cookie length exceeds the configured limit
- VIOL_COOKIE_MALFORMED: Triggered when cookies are not RFC-compliant
- VIOL_COOKIE_MODIFIED: Triggered when domain cookies have been tampered with
For each violation type, you can:
- Set the enforcement action
- Toggle Alarm,Alarm and Block, orDisabledsettings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
- 
Choose Cookie Type: - Select either Explicitfor exact cookie matching orWildcardfor pattern-based matching
 
- Select either 
- 
Configure Basic Properties: - Enter the Cookie Name
- Choose whether to mask the cookie value in logs
 
- Enter the 
- 
Set Enforcement Type: - Choose either AlloworEnforce
 
- Choose either 
- 
Optional: Configure Attack Signatures - If enabled, you can overwrite attack signatures for this specific cookie
- For details on signature configuration, refer to the documentation on Add Signature Sets
 
- 
Select Add Cookie to save your configuration 
Parameter protections can be configured and managed directly within the policy editor by selecting the Parameters option.
Each parameter configuration includes:
- Parameter Type:- Explicitor- Wildcard. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.
- Parameter Name: The name of the parameter
- Location: Where the parameter is expected (URL query string, POST data, etc.)
- Value Type: The expected type of the parameter value (e.g., alpha-numeric, integer, email)
- Attack Signatures: Whether attack signature checking is enabled for this parameter
- Mask value in logs: When enabled, the parameter’s value will be masked in the request log for enhanced security and privacy. This sets- sensitiveParameterproperty of the parameter item.
For a complete list of configurable parameter properties and options, see the Parameter Configuration Parameters documentation under the parameters section.
Select Edit Configuration to configure parameter violations. The following violations can be configured for parameters:
- VIOL_PARAMETER: Triggered when an illegal parameter is detected
- VIOL_PARAMETER_ARRAY_VALUE: Triggered when an array parameter value is illegal
- VIOL_PARAMETER_DATA_TYPE: Triggered when parameter data type doesn’t match configured security policy
- VIOL_PARAMETER_EMPTY_VALUE: Triggered when a parameter value is empty but shouldn’t be
- VIOL_PARAMETER_LOCATION: Triggered when a parameter is found in wrong location
- VIOL_PARAMETER_MULTIPART_NULL_VALUE: Triggered when the multi-part request has a parameter value that contains the NULL character (0x00)
- VIOL_PARAMETER_NAME_METACHAR: Triggered when illegal meta characters are found in parameter name
- VIOL_PARAMETER_NUMERIC_VALUE: Triggered when numeric parameter value is outside allowed range
- VIOL_PARAMETER_REPEATED: Triggered when a parameter name is repeated illegally
- VIOL_PARAMETER_STATIC_VALUE: Triggered when a static parameter value doesn’t match configured security policy
- VIOL_PARAMETER_VALUE_BASE64: Triggered when the value is not a valid Base64 string
- VIOL_PARAMETER_VALUE_LENGTH: Triggered when parameter value length exceeds limits
- VIOL_PARAMETER_VALUE_METACHAR: Triggered when illegal meta characters are found in parameter value
- VIOL_PARAMETER_VALUE_REGEXP: Triggered when parameter value doesn’t match required pattern
For each violation type, you can:
- Set the enforcement action
- Toggle Alarm,Alarm and Block, orDisabledsettings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
- 
Choose Parameter Type: - Select either Explicitfor exact parameter matching orWildcardfor pattern-based matching
 
- Select either 
- 
Configure Basic Properties: - Enter the parameter Parameter Name
- Select the Locationwhere the parameter is expected
- Choose the Value Type(alpha-numeric, integer, email, etc.)
- Set the Data Typeif applicable
 
- Enter the parameter 
- 
Set Security Options: - Choose whether to enable attack signatures
 Attack Signatures are only applicable when the Value Type isUser InputorArrayand the Data Type is eitherAlphanumericorBinary- Decide if parameter value should be masked in logs which sets sensitiveParameterin Parameter Configuration Reference
 
- 
Optional: Configure Attack Signatures - If enabled, you can overwrite attack signatures for this specific parameter
- For details on signature configuration, refer to the documentation on Add Signature Sets
 
- 
Select Add Parameter to save your configuration 
URL protections can be configured and managed directly within the policy editor by selecting the URLs option.
Each URL configuration includes:
- URL Type:- Explicitor- Wildcard. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.
- Method: Specifies the HTTP method(s) for the URL (- GET,- POST,- PUT, etc.)
- Protocol: The protocol for the URL (- HTTP/- HTTPS)
- Enforcement Type:- Allow: Permits access to the URL with optional attack signature checks
- Disallow: Blocks access to the URL entirely
 
- Attack Signatures: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable
⚠️ Important: Attack Signatures are automatically shown as "Not Applicable" when Enforcement Type is set toDisallowsince the URL is explicitly blocked and signature checking is unnecessary.
For a complete list of configurable URL properties and options, see the URL Configuration Parameters documentation under the urls section.
Select Edit Configuration to configure URL violations. The following violations can be configured for URLs:
- VIOL_URL: Triggered when an illegal URL is accessed
- VIOL_URL_CONTENT_TYPE: Triggered when there’s an illegal request content type
- VIOL_URL_LENGTH: Triggered when URL length exceeds the configured limit
- VIOL_URL_METACHAR: Triggered when illegal meta characters are found in the URL
For each violation type, you can:
- Set the enforcement action
- Toggle Alarm,Alarm and Block, orDisabledsettings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
- 
Choose URL Type: - Select either Explicitfor exact URL matching orWildcardfor pattern-based matching
 
- Select either 
- 
Configure Basic Properties: - Enter the URLpath (e.g.,/index.html,/api/data)- The URL path must start with /
 
- The URL path must start with 
- Select HTTP Method(s)(e.g.,GET,POST, *)
- Choose the Protocol(HTTP/HTTPS)
 
- Enter the 
- 
Set Enforcement: - Choose whether to allow or disallow the URL
- If Allow URLis selected, you can optionally enable attack signatures
 ⚠️ Important: Attack signatures cannot be enabled for disallowed URLs.
- 
Optional: Configure Attack Signatures - If enabled, you can overwrite attack signatures for this specific URL
- For details on signature configuration, refer to the documentation on Add Signature Sets
 
- 
Select Add URL to save your configuration