Configuring Protection Policies¶
Configuring Basic Protection Rules to Defend Against Common Web Attacks
Configuring CC Attack Protection Rules to Defend Against CC Attacks
Configuring IP Address Blacklist and Whitelist Rules to Block or Allow Specified IP Addresses
Configuring Geolocation Access Control Rules to Block or Allow Requests from Specific Locations
Configuring Web Tamper Protection Rules to Prevent Static Web Pages from Being Tampered With
Configuring Information Leakage Prevention Rules to Protect Sensitive Information from Leakage
Configuring a Global Proteciton whitelist Rule to Ignore False Alarms
Configuring Data Masking Rules to Prevent Privacy Information Leakage
Creating a Reference Table to Configure Protection Metrics In Batches
Configuring a Known Attack Source Rule to Block Specific Visitors for a Specified Duration