Add cookies, parameters, and URLs
Cookie protections can be configured and managed directly in the policy editor by selecting Cookies in the web interface.
Each cookie configuration includes:
Cookie Type:ExplicitorWildcard. For details on explicit and wildcard matching, see Matching Types: Explicit vs Wildcard.Cookie Name: The name of the cookie to monitor or protect.Enforcement Type:- Allow: The cookie can be changed by the client and is not protected from modification.
- Enforce: The cookie cannot be changed by the client.
Attack Signatures: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable.Mask value in logs: When enabled, the cookie’s value is masked in the request log for improved security and privacy.
For a complete list of configurable cookie properties and options, see the Cookie Configuration Parameters documentation under the cookies section.
Select Edit configuration to configure cookie violations. The following violations can be configured for cookies:
VIOL_COOKIE_EXPIRED: Triggered when a cookie’s timestamp is expired.VIOL_COOKIE_LENGTH: Triggered when a cookie length exceeds the configured limit.VIOL_COOKIE_MALFORMED: Triggered when cookies are not RFC-compliant.VIOL_COOKIE_MODIFIED: Triggered when domain cookies have been tampered with.
For each violation type, you can:
- Set the enforcement action.
- Toggle
Alarm,Alarm and Block, orDisabledsettings.
See Supported Violations for additional details.
- Choose a Cookie Type:
- Select either
Explicitfor exact cookie matching orWildcardfor pattern-based matching.
- Select either
- Configure basic properties:
- Enter the
Cookie Name. - Choose whether to mask the cookie value in logs.
- Enter the
- Set an Enforcement Type:
- Choose either
AlloworEnforce.
- Choose either
- (Optional) Configure attack signatures:
- If enabled, you can override attack signatures for this cookie.
- For details on signature configuration, see Add Signature Sets.
- Select Add cookie to save your configuration.
Parameter protections can be configured and managed directly in the policy editor by selecting Parameters in the web interface.
Each parameter configuration includes:
Parameter Type:ExplicitorWildcard. For details on explicit and wildcard matching, see Matching Types: Explicit vs Wildcard.Parameter Name: The name of the parameter.Location: Where the parameter is expected (URL query string, POST data, etc.).Value Type: The expected type of the parameter value (for example, alphanumeric, integer, or email).Attack Signatures: Whether attack signature checking is enabled for this parameter.Mask value in logs: When enabled, the parameter’s value is masked in the request log for enhanced security and privacy. This sets thesensitiveParameterproperty of the parameter item.
For a complete list of configurable parameter properties and options, see the Parameter Configuration Parameters documentation under the parameters section.
Select Edit configuration to configure parameter violations. The following violations can be configured for parameters:
VIOL_PARAMETER: Triggered when an illegal parameter is detected.VIOL_PARAMETER_ARRAY_VALUE: Triggered when an array parameter value is illegal.VIOL_PARAMETER_DATA_TYPE: Triggered when a parameter’s data type doesn’t match the configured policy.VIOL_PARAMETER_EMPTY_VALUE: Triggered when a parameter value is empty but shouldn’t be.VIOL_PARAMETER_LOCATION: Triggered when a parameter is found in the wrong location.VIOL_PARAMETER_MULTIPART_NULL_VALUE: Triggered when the multi-part request has a parameter value that contains a null character (0x00).VIOL_PARAMETER_NAME_METACHAR: Triggered when illegal meta characters are found in a parameter name.VIOL_PARAMETER_NUMERIC_VALUE: Triggered when a numeric parameter value is outside the allowed range.VIOL_PARAMETER_REPEATED: Triggered when a parameter name is repeated illegally.VIOL_PARAMETER_STATIC_VALUE: Triggered when a static parameter value doesn’t match the configured security policy.VIOL_PARAMETER_VALUE_BASE64: Triggered when the value isn’t a valid Base64 string.VIOL_PARAMETER_VALUE_LENGTH: Triggered when a parameter value length exceeds limits.VIOL_PARAMETER_VALUE_METACHAR: Triggered when illegal meta characters are found in a parameter value.VIOL_PARAMETER_VALUE_REGEXP: Triggered when a parameter value doesn’t match the required pattern.
For each violation type, you can:
- Set the enforcement action.
- Toggle
Alarm,Alarm and Block, orDisabledsettings.
See Supported Violations for additional details.
-
Choose a Parameter Type:
- Select either
Explicitfor exact parameter matching orWildcardfor pattern-based matching.
- Select either
-
Configure basic properties:
- Enter the
Parameter Name. - Select the
Locationwhere the parameter is expected. - Choose the
Value Type(alphanumeric, integer, email, etc.). - Set the
Data Typeif applicable.
- Enter the
-
Set security options:
- Choose whether to enable attack signatures.
Attack signatures are only applicable when the Value Type isUser InputorArray, and the Data Type is eitherAlphanumericorBinary.- Decide if parameter values should be masked in logs. This sets the
sensitiveParameterproperty.
-
(Optional) Configure attack signatures:
- If enabled, you can override attack signatures for this parameter.
- For details on signature configuration, see Add Signature Sets.
-
Select Add parameter to save your configuration.
URL protections can be configured and managed directly in the policy editor by selecting URLs in the web interface.
Each URL configuration includes:
URL Type:ExplicitorWildcard. For details on explicit and wildcard matching, see Matching Types: Explicit vs Wildcard.Method: Specifies the HTTP method(s) for the URL (GET,POST,PUT, etc.).Protocol: The protocol for the URL (HTTPorHTTPS).Enforcement Type:- Allow: Permits access to the URL with optional attack signature checks.
- Disallow: Blocks access to the URL entirely.
Attack Signatures: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable.
Attack signatures are automatically shown as “Not applicable” when the Enforcement Type is set toDisallow, since the URL is explicitly blocked and signature checking is unnecessary.
For a complete list of configurable URL properties and options, see the URL Configuration Parameters documentation under the urls section.
Select Edit configuration to configure URL violations. The following violations can be configured for URLs:
VIOL_URL: Triggered when an illegal URL is accessed.VIOL_URL_CONTENT_TYPE: Triggered when there’s an illegal request content type.VIOL_URL_LENGTH: Triggered when the URL length exceeds the configured limit.VIOL_URL_METACHAR: Triggered when illegal meta characters are found in the URL.
For each violation type, you can:
- Set the enforcement action.
- Toggle
Alarm,Alarm and Block, orDisabledsettings.
See Supported Violations for additional details.
-
Choose a URL Type:
- Select either
Explicitfor exact URL matching orWildcardfor pattern-based matching.
- Select either
-
Configure basic properties:
- Enter the
URLpath (for example,/index.html,/api/data). - The URL path must start with
/. - Select the HTTP
Method(s)(for example,GET,POST,*). - Choose the
Protocol(HTTPorHTTPS).
- Enter the
-
Set enforcement:
- Choose whether to allow or disallow the URL.
- If Allow is selected, you can optionally enable attack signatures.
Attack signatures cannot be enabled for disallowed URLs. -
(Optional) Configure attack signatures:
- If enabled, you can override attack signatures for this specific URL.
- For details on signature configuration, see Add Signature Sets.
-
Select Add URL to save your configuration.