public enum RuleNumber : System.Enum
public enum RuleNumber : System.Enum
Member | Description |
---|---|
AddHockRequests | If resource referred by other domain then this must be enabled on the endpoint |
AgentsConsideredMalicious | A bad browser was used |
AgentsReputationBlocksAccess | the agents reputation blocks access to the resource |
BlacklistedCountry | The country was blacklisted |
BlacklistedInterNetServiceProvider | The Internet service provider was blacklisted |
BlacklistedIPAddress | The IP address was blacklisted |
BlacklistedUser | The user was blacklisted |
BlockedGeography | If the requested resource or the firewall doesn't allow access from a geographical region then intervene |
CommonVulnerabilitiesExposuresExploits | A known Common Vulnerabilities and Exposures exploits (CVE) |
CrossSiteRequest | Accessing a resource from outside the domain (cross site) is rejected if the domain is not white-listed |
CSPReportGeneratedByBrowser | The browser triggered a CSP violation |
DistributedDenialOfService | The same page would only be visited a given time in a given time span by users that do not interact with the page |
FilterActionProtectorViolation | Action Protector filters rejected the request |
HitRatioViolation | The same page would only be visited so many times by a user in a given time in a given time span |
LimitedReferrersOnly | The resource or AJAX endpoint is accessed from a location that was not white-listed for the endpoint with the annotation |
ModelFilterViolation | Model did not contain a page request in the proper association |
NavigationOutsideRenederedSiteMap | The user navigated to a link that was not provided to him |
None | No rule applied |
NotSupportedHandler | A Handler was called that is not supported |
PageGroupCookie | If Request has PageRequest Group Header and CookieWas set then Match to Page was send to user |
PageGroupHeader | If Request has PageRequest Group Header then Match to Page was send to user |
PenetrationAttempt | The user provided a url that looks like a penetration attempt was made |
PhishyRequest | A Phishy request was detected |
PoisonedCookies | The user provided a cookies have been altered, looks penetration attempt are made |
PortPhishyRequest | A request from a source intercepted that attempted to access the application as well as monitored non application ports |
RefreshViolations | The same page has been refreshed to often |
RejectAccessForISP | Internet service provider is blocked |
RejectAccessUAForISP | Internet service provider blocks User Agent |
RejectAPIAccess | API access is not allowed |
RejectHoneyPotTraps | accessed a link that was set to be a honey pot |
RejectKnowsMaliciousUsers | The user should not be flagged as malicious by database, cookie or session storage |
RejectPortScanners | The reject port scanners |
RejectTCPResetAttacks | a possible TCP reset attack received |
RejectTorNodes | The reject tor nodes |
SaltCookie | If Request contains a Salt header as well as a Salt Cookie then Match UserSalt with header and salt cookie |
SaltHeader | If Request contains a Salt header then Match UserSalt with header |
Scrubbing | The user is not supposed to data-mine the provided data |
SessionCookie | If Request has SessionId header then Match Page Session Hash and user Cookie Session hash |
SessionHeader | If Request has SessionId header then it should Match the Page Session Hash |
TCPResetAttack | A TCP reset attack detected |
UserGenerated | User generated block request |
WrongProtocol | The wrong protocol |
WrongUserType | Wrong user type |
System.Object
System.ValueType
System.Enum
Walter.Web.FireWall.RuleNumber
Target Platforms: Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2