You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This feature requires an Enterprise plan with a paid add-on.
@@ -17,7 +17,108 @@ This feature requires an Enterprise plan with a paid add-on.
17
17
18
18
At the account level, you can deploy each [WAF managed ruleset](/waf/managed-rules/#managed-rulesets) more than once. This means that you can apply the same managed ruleset with different configurations to different subsets of incoming traffic for the Enterprise zones in your account.
19
19
20
-
For example, you could deploy the [Cloudflare OWASP Core Ruleset](/waf/managed-rules/reference/owasp-core-ruleset/) multiple times with different paranoia levels and a different action (_Log_ action for PL4 and _Managed Challenge_ action for PL3). Refer to [Example OWASP configuration](/waf/account/managed-rulesets/owasp-example/) for details on how to set up this configuration.
20
+
For example, you could deploy the [Cloudflare OWASP Core Ruleset](/waf/managed-rules/reference/owasp-core-ruleset/) multiple times with different paranoia levels and a different action (_Managed Challenge_ action for PL3 and _Log_ action for PL4).
21
+
22
+
<Detailsheader="Example: Deploy OWASP with two different configurations">
23
+
24
+
The following example deploys the [Cloudflare OWASP Core Ruleset](/waf/managed-rules/reference/owasp-core-ruleset/) multiple times at the account level through the following execute rules:
25
+
26
+
- First execute rule: Enable OWASP rules up to paranoia level 3 (PL3) and set the action to _Managed Challenge_.
27
+
- Second execute rule: Enable OWASP rules up to PL4 and set the action to _Log_.
28
+
29
+
This configuration gives you additional protection by enabling PL3 rules, but without blocking the requests, since higher paranoia levels are more prone to false positives.
30
+
31
+
The second rule logs any matches for PL4 rules, the most strict set of rules in the ruleset, so that it does not affect live traffic. You could use this configure to understand which traffic would be affected by PL4 rules.
4. Next to the **Cloudflare OWASP Core Ruleset**, select **Select ruleset**.
42
+
43
+
5. Give a name to the rule deploying the ruleset in **Execution name**.
44
+
45
+
6. (Optional) To execute the managed ruleset for a subset of incoming requests, select **Edit scope** and [configure the expression](/ruleset-engine/rules-language/expressions/edit-expressions/) that will determine the scope of the current rule deploying the managed ruleset.
46
+
47
+
7. Customize the behavior of the managed ruleset in the following ways:
48
+
49
+
-**OWASP Anomaly Score Threshold**: _Medium - 40 and higher_
50
+
-**OWASP Paranoia Level**: _PL3_
51
+
-**OWASP Action**: _Managed Challenge_
52
+
53
+
8. Select **Deploy**.
54
+
55
+
9. Repeat the procedure with the following ruleset configuration:
56
+
57
+
-**OWASP Anomaly Score Threshold**: _Medium - 40 and higher_
58
+
-**OWASP Paranoia Level**: _PL4_
59
+
-**OWASP Action**: _Log_
60
+
61
+
Once you finish your configuration, the **Deployed managed rulesets** list will show two _Execute_ rules for the Cloudflare OWASP Core Ruleset.
62
+
63
+
</TabItem> <TabItemlabel="API">
64
+
65
+
The following `POST` request creates an [entry point ruleset](/ruleset-engine/about/rulesets/#entry-point-ruleset) for the `http_request_firewall_managed` phase at the account level. The ruleset includes two rules deploying the Cloudflare OWASP Core Ruleset twice with different configurations.
0 commit comments