public enum IncidentAssertType : System.Enum
public enum IncidentAssertType : System.Enum
Member | Description |
---|---|
AddHockRequests | Request to resource from outside of the domain like links to documents images etc |
AgentsConsideredMalicious | Bad user agent |
Blacklisted | The user, IP address, or ISP was blacklisted |
BlockDurationExpires | The blocking duration expires on provided date |
DDOSPageLoads | Requests vs allowed requests |
DDOSTimeSpan | Timespan of measuring request counts |
EffectiveCSPDirective | the effective CSP directive on the page |
HidRatePageLoads | Page load vs allowed loads |
HitRateTimeSpan | Timespan of measuring page load counts |
HoneyPotPortUsers | Detected User using HoneyPot |
InternetServiceProviderBlocksUserAgent | The Internet service provider is blocked |
Location | the location where the pattern was found to be in violation |
MaximumViolations | Maximum violations reached |
Model | The endpoint expected a model but none where provided |
NotSet | The type was not set |
PageState | Page/ request status |
Pattern | the pattern discovered to be in violation |
PenetrationAttempt | The url contains a SQL or script injection |
PoisonedCookies | Incident created due to cookie poisoning |
PortScann | The indecent is of type port scan indicating that the user tried to access a non-intended port |
Referrer | The referrer value provided |
RefreshRatePageLoads | The page was refreshed more often than allowed |
RepeatViolator | the requester is doing repeated violations |
Report | special type showing the whole incident report of the users session |
RequestersAssociations | The request is not associated in the right way with the user validated via the PageRequestId |
RuleNr | an optional rule number detailing the reason |
ScrubbingPageLoads | data load vs allowed loads |
ScrubbingTimeSpan | Timespan of measuring data load counts |
SessionTrackingCookie | FireWall Session in Cookie |
SessionTrackingCookieSet | indicate if optional cookie was used when tracking session cookie values |
SessionTrackingHeader | FireWall Session ID in header |
SiteMapStatus | SiteMap status |
TCPResetAttack | The source used a ResetAttack to block the application |
TorExitNode | The user visits from a Tor exit node |
UserCookieSalt | Salt cookie value |
UserCookieSaltSet | indicate if optional cookie was used when tracking user salt cookie values |
UserGenerated | User generated incident type and will contain the rule supplied by the user code |
UserHeaderSalt | Salt header value |
ViolatedCSPDirective | The violated directive in the report |
WrongAccessLocation | the geographical location from where the resource was requested is not supposed to access the resource |
WrongAccessMethod | Wrong way of accessing an endpoint, can be that a HttpGet was used on a HttpPost endpoint |
WrongUserType | The user accessing the resource is not associated with the correct group |
System.Object
System.ValueType
System.Enum
Walter.BOM.IncidentAssertType
Target Platforms: Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2