What kind of detection rules can be created and how are they managed, for Web Security Manager and Web Security Manager Premier?

Answered

Comments

1 comment

  • Official comment
    Avatar
    Lindsey Stirneman

    Other than the base rule set, which is quite vast and covers the OWASP Top 10 plus many known vulnerabilities, you can add regex-based, URL-based, and/or path-based detection rules. It all depends on your applications and traffic needs.

Please sign in to leave a comment.