Class ActionProtectorAttribute allows you to discover malicious activity against actions and the models that are posted to these actions
Reject add-hock requests
base class for firewall annotation attributes
This attribute allows you to configure a specific rule on a controller or a specific action end enables you to specify how long something should be blocked. Implements the Attribute
Prevents Cross-site request (or CSRF) disallow an attacker to induce actions that they do not intend to. Only HTTPS requests are supported!
Disables all rules and validations on an endpoint(s) by the firewall, basically it's an Always-Off for an endpoint
Protects and block any requests that are in violation on URL type pattern attacks and allow only a the specified user types
This annotation allows for the granular control GEO blocking in the firewall if GEO blocking modules are registered in service configuration
Tells the Firewall to ignore geographically access filters to an endpoint Implements the Attribute
The hit ratio attribute set rule of how often a user is allowed to access the action in a given time. This method specifically helps when protecting probing password recovery or logins or resubmitting the same page scrubbing for data.
Tells the firewall to ignore this controller or action and perform no actions at all. This is especially use full for those endpoints that do error handling. Implements the Attribute
Reject known malicious users
Attribute used to limit the locations where your API or Action can be called from. to a singe resource
Will reject all requests from UserAgents used by bots or browsers that are considered to me malicious
Will minify the Razor output if the request is a HTTPGet and does not contain an error.
Validates that the model send back to the application is in the right scope
Tells the razor engine to include not cash the response in any form or way guarantying that the action is re-executed
Tells the firewall how ofter a page can be refreshed by the user during a page visit. Implements the Attribute
Page scrubbing attribute indicates that the endpoint will be protected from data scrubbing
Rule for dealing with poisoned cookies
Ensure that all cookies are secure unless explicitly specified and data in the cookie is GDPR protected if at all possible
Class FireWallAttribute stating what type of consumers are allowed. Helps mitigate scrubbing and bots reading the sites data
White-List IP address single or ranges for a specific guard action
AllowRaiseIncident access only to all resources if they are in the same subnet as the server