Add cookies, parameters and URLs
Cookie protections can be configured and managed directly within the policy editor by selecting the Cookies option.
Each cookie configuration includes:
Cookie Type:ExplicitorWildcard. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Cookie Name: The name of the cookie to be monitored or protectedEnforcement Type:- Allow: Specifies that this cookie may be changed by the client. The cookie is not protected from modification
- Enforce: Specifies that this cookie may not be changed by the client
Attack Signatures: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicableMask value in logs: When enabled, the cookie’s value will be masked in the request log for enhanced security and privacy
For a complete list of configurable cookie properties and options, see the Cookie Configuration Parameters documentation under the cookies section.
Select Edit Configuration to configure cookie violations. The following violations can be configured for cookies:
VIOL_COOKIE_EXPIRED: Triggered when a cookie’s timestamp is expiredVIOL_COOKIE_LENGTH: Triggered when cookie length exceeds the configured limitVIOL_COOKIE_MALFORMED: Triggered when cookies are not RFC-compliantVIOL_COOKIE_MODIFIED: Triggered when domain cookies have been tampered with
For each violation type, you can:
- Set the enforcement action
- Toggle
Alarm,Alarm and Block, orDisabledsettings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose Cookie Type:
- Select either
Explicitfor exact cookie matching orWildcardfor pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the
Cookie Name - Choose whether to mask the cookie value in logs
- Enter the
-
Set Enforcement Type:
- Choose either
AlloworEnforce
- Choose either
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific cookie
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add Cookie to save your configuration
Parameter protections can be configured and managed directly within the policy editor by selecting the Parameters option.
Each parameter configuration includes:
Parameter Type:ExplicitorWildcard. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Parameter Name: The name of the parameterLocation: Where the parameter is expected (URL query string, POST data, etc.)Value Type: The expected type of the parameter value (e.g., alpha-numeric, integer, email)Attack Signatures: Whether attack signature checking is enabled for this parameterMask value in logs: When enabled, the parameter’s value will be masked in the request log for enhanced security and privacy. This setssensitiveParameterproperty of the parameter item.
For a complete list of configurable parameter properties and options, see the Parameter Configuration Parameters documentation under the parameters section.
Select Edit Configuration to configure parameter violations. The following violations can be configured for parameters:
VIOL_PARAMETER: Triggered when an illegal parameter is detectedVIOL_PARAMETER_ARRAY_VALUE: Triggered when an array parameter value is illegalVIOL_PARAMETER_DATA_TYPE: Triggered when parameter data type doesn’t match configured security policyVIOL_PARAMETER_EMPTY_VALUE: Triggered when a parameter value is empty but shouldn’t beVIOL_PARAMETER_LOCATION: Triggered when a parameter is found in wrong locationVIOL_PARAMETER_MULTIPART_NULL_VALUE: Triggered when the multi-part request has a parameter value that contains the NULL character (0x00)VIOL_PARAMETER_NAME_METACHAR: Triggered when illegal meta characters are found in parameter nameVIOL_PARAMETER_NUMERIC_VALUE: Triggered when numeric parameter value is outside allowed rangeVIOL_PARAMETER_REPEATED: Triggered when a parameter name is repeated illegallyVIOL_PARAMETER_STATIC_VALUE: Triggered when a static parameter value doesn’t match configured security policyVIOL_PARAMETER_VALUE_BASE64: Triggered when the value is not a valid Base64 stringVIOL_PARAMETER_VALUE_LENGTH: Triggered when parameter value length exceeds limitsVIOL_PARAMETER_VALUE_METACHAR: Triggered when illegal meta characters are found in parameter valueVIOL_PARAMETER_VALUE_REGEXP: Triggered when parameter value doesn’t match required pattern
For each violation type, you can:
- Set the enforcement action
- Toggle
Alarm,Alarm and Block, orDisabledsettings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose Parameter Type:
- Select either
Explicitfor exact parameter matching orWildcardfor pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the parameter
Parameter Name - Select the
Locationwhere the parameter is expected - Choose the
Value Type(alpha-numeric, integer, email, etc.) - Set the
Data Typeif applicable
- Enter the parameter
-
Set Security Options:
- Choose whether to enable attack signatures
Attack Signatures are only applicable when the Value Type isUser InputorArrayand the Data Type is eitherAlphanumericorBinary- Decide if parameter value should be masked in logs which sets
sensitiveParameterin Parameter Configuration Reference
-
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific parameter
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add Parameter to save your configuration
URL protections can be configured and managed directly within the policy editor by selecting the URLs option.
Each URL configuration includes:
URL Type:ExplicitorWildcard. For details on explicit and wildcard matching, see the Matching Types: Explicit vs Wildcard section.Method: Specifies the HTTP method(s) for the URL (GET,POST,PUT, etc.)Protocol: The protocol for the URL (HTTP/HTTPS)Enforcement Type:- Allow: Permits access to the URL with optional attack signature checks
- Disallow: Blocks access to the URL entirely
Attack Signatures: Indicates whether attack signatures and threat campaigns are enabled, disabled, or not applicable
⚠️ Important: Attack Signatures are automatically shown as “Not Applicable” when Enforcement Type is set toDisallowsince the URL is explicitly blocked and signature checking is unnecessary.
For a complete list of configurable URL properties and options, see the URL Configuration Parameters documentation under the urls section.
Select Edit Configuration to configure URL violations. The following violations can be configured for URLs:
VIOL_URL: Triggered when an illegal URL is accessedVIOL_URL_CONTENT_TYPE: Triggered when there’s an illegal request content typeVIOL_URL_LENGTH: Triggered when URL length exceeds the configured limitVIOL_URL_METACHAR: Triggered when illegal meta characters are found in the URL
For each violation type, you can:
- Set the enforcement action
- Toggle
Alarm,Alarm and Block, orDisabledsettings
For more details about enforcement modes, see the Glossary, specifically the entry: Enforcement mode.
See the Supported Violations for additional details.
-
Choose URL Type:
- Select either
Explicitfor exact URL matching orWildcardfor pattern-based matching
- Select either
-
Configure Basic Properties:
- Enter the
URLpath (e.g.,/index.html,/api/data)- The URL path must start with
/
- The URL path must start with
- Select HTTP
Method(s)(e.g.,GET,POST, *) - Choose the
Protocol(HTTP/HTTPS)
- Enter the
-
Set Enforcement:
- Choose whether to allow or disallow the URL
- If
Allow URLis selected, you can optionally enable attack signatures
⚠️ Important: Attack signatures cannot be enabled for disallowed URLs. -
Optional: Configure Attack Signatures
- If enabled, you can overwrite attack signatures for this specific URL
- For details on signature configuration, refer to the documentation on Add Signature Sets
-
Select Add URL to save your configuration