diff --git a/content/includes/nap-waf/policy.html b/content/includes/nap-waf/policy.html index 9c9bc348f..446d4fc44 100644 --- a/content/includes/nap-waf/policy.html +++ b/content/includes/nap-waf/policy.html @@ -803,36 +803,12 @@
| Field Name | -Type | -Description | -Allowed Values | -
|---|---|---|---|
|
-string |
-Specifies action that is applied when defined threshold is reached. -- |
-
|
-
enabled |
-boolean | -When enabled, the system counts successful CAPTCHA challenges with failed logins from IP Address / Device ID. | -- |
threshold |
-integer minimum: 1 maximum: 100 | -After configured threshold (number of successful CAPTCHA challenges with failed logins from IP Address / Device ID) defined action will be applied for the next login attempt | -- |
| Field Name | -Type | -Description | -Allowed Values | -
|---|---|---|---|
|
-string |
-Specifies action that is applied when defined threshold is reached. -- |
-
|
-
enabled |
-boolean | -When enabled, the system counts successful challenges with failed logins from IP Address / Device ID / Username. Legitimate users who have disabled JavaScripting on their browsers for security reasons will fail a client side integrity challenge. | -- |
threshold |
-integer minimum: 1 maximum: 100 | -After configured threshold (number of successful challenges with failed logins from IP Address / Device ID / Username) defined action will be applied for the next login attempt | -- |
|
|||
detectCredentialsStuffingAttack |
-boolean | -When enabled, the system detects login attempts that match known leaked credentials library. | -- |
detectDistributedBruteForceAttack |
-boolean | -When enabled, the system detects distributed brute force attacks. | -- |
failedLoginAttemptsRateReached |
integer minimum: 1 maximum: 10000 | After configured threshold (number of failed login attempts within measurementPeriod) defined action will be applied for the next login attempt. | @@ -1036,104 +904,6 @@
| Field Name | -Type | -Description | -Allowed Values | -
|---|---|---|---|
|
-string |
-Specifies action when leaked credentials detected. -- |
-
|
-
enabled |
-boolean | -When enabled, the system can match presented credentials to those in the credentials dictionary to detect leaked credentials. | -- |
| Field Name | -Type | -Description | -Allowed Values | -
|---|---|---|---|
|
-string |
-Specifies action that is applied when defined threshold is reached. -- |
-
|
-
enabled |
-boolean | -When enabled, the system counts failed login attempts for Device ID. | -- |
threshold |
-integer minimum: 1 maximum: 100 | -After configured threshold (number of failed login attempts for Device ID) defined action will be applied for the next login attempt. | -- |
logi
|
|