You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**[REQUEST-913-SCANNER-DETECTION](?tabs=owasp30#crs913-30)**|Protect against port and environment scanners|
199
+
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](?tabs=owasp30#crs920-30)**|Protect against protocol and encoding issues|
200
+
|**[REQUEST-921-PROTOCOL-ATTACK](?tabs=owasp30#crs921-30)**|Protect against header injection, request smuggling, and response splitting|
201
+
|**[REQUEST-930-APPLICATION-ATTACK-LFI](?tabs=owasp30#crs930-30)**|Protect against file and path attacks|
202
+
|**[REQUEST-931-APPLICATION-ATTACK-RFI](?tabs=owasp30#crs931-30)**|Protect against remote file inclusion (RFI) attacks|
203
+
|**[REQUEST-932-APPLICATION-ATTACK-RCE](?tabs=owasp30#crs932-30)**|Protect again remote code execution attacks|
204
+
|**[REQUEST-933-APPLICATION-ATTACK-PHP](?tabs=owasp30#crs933-30)**|Protect against PHP-injection attacks|
205
+
|**[REQUEST-941-APPLICATION-ATTACK-XSS](?tabs=owasp30#crs941-30)**|Protect against cross-site scripting attacks|
206
+
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](?tabs=owasp30#crs942-30)**|Protect against SQL-injection attacks|
207
+
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](?tabs=owasp30#crs943-30)**|Protect against session-fixation attacks|
208
208
209
209
### OWASP CRS 2.2.9
210
210
@@ -215,36 +215,36 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
215
215
216
216
|Rule group name|Description|
217
217
|---|---|
218
-
|**[crs_20_protocol_violations](#crs20)**|Protect against protocol violations (such as invalid characters or a GET with a request body)|
219
-
|**[crs_21_protocol_anomalies](#crs21)**|Protect against incorrect header information|
220
-
|**[crs_23_request_limits](#crs23)**|Protect against arguments or files that exceed limitations|
221
-
|**[crs_30_http_policy](#crs30)**|Protect against restricted methods, headers, and file types|
222
-
|**[crs_35_bad_robots](#crs35)**|Protect against web crawlers and scanners|
223
-
|**[crs_40_generic_attacks](#crs40)**|Protect against generic attacks (such as session fixation, remote file inclusion, and PHP injection)|
224
-
|**[crs_41_sql_injection_attacks](#crs41sql)**|Protect against SQL-injection attacks|
225
-
|**[crs_41_xss_attacks](#crs41xss)**|Protect against cross-site scripting attacks|
226
-
|**[crs_42_tight_security](#crs42)**|Protect against path-traversal attacks|
227
-
|**[crs_45_trojans](#crs45)**|Protect against backdoor trojans|
218
+
|**[crs_20_protocol_violations](?tabs=owasp2#crs20)**|Protect against protocol violations (such as invalid characters or a GET with a request body)|
219
+
|**[crs_21_protocol_anomalies](?tabs=owasp2#crs21)**|Protect against incorrect header information|
220
+
|**[crs_23_request_limits](?tabs=owasp2#crs23)**|Protect against arguments or files that exceed limitations|
221
+
|**[crs_30_http_policy](?tabs=owasp2#crs30)**|Protect against restricted methods, headers, and file types|
222
+
|**[crs_35_bad_robots](?tabs=owasp2#crs35)**|Protect against web crawlers and scanners|
223
+
|**[crs_40_generic_attacks](?tabs=owasp2#crs40)**|Protect against generic attacks (such as session fixation, remote file inclusion, and PHP injection)|
224
+
|**[crs_41_sql_injection_attacks](?tabs=owasp2#crs41sql)**|Protect against SQL-injection attacks|
225
+
|**[crs_41_xss_attacks](?tabs=owasp2#crs41xss)**|Protect against cross-site scripting attacks|
226
+
|**[crs_42_tight_security](?tabs=owasp2#crs42)**|Protect against path-traversal attacks|
227
+
|**[crs_45_trojans](?tabs=owasp2#crs45)**|Protect against backdoor trojans|
228
228
229
229
### Bot Manager 1.0
230
230
231
231
The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots.
232
232
233
233
|Rule group|Description|
234
234
|---|---|
235
-
|[BadBots](#bot100)|Protect against bad bots|
236
-
|[GoodBots](#bot200)|Identify good bots|
237
-
|[UnknownBots](#bot300)|Identify unknown bots|
235
+
|**[BadBots](?tabs=bot#bot100)**|Protect against bad bots|
236
+
|**[GoodBots](?tabs=bot#bot200)**|Identify good bots|
The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection.
242
242
243
243
|Rule group|Description|
244
244
|---|---|
245
-
|[BadBots](#bot11-100)|Protect against bad bots|
246
-
|[GoodBots](#bot11-200)|Identify good bots|
247
-
|[UnknownBots](#bot11-300)|Identify unknown bots|
245
+
|**[BadBots](?tabs=bot11#bot11-100)**|Protect against bad bots|
246
+
|**[GoodBots](?tabs=bot11#bot11-200)**|Identify good bots|
0 commit comments