public enum FireWallGuardActions : System.Enum
public enum FireWallGuardActions : System.Enum
Member | Description |
---|---|
AJAX_ENDPOINT | shorthand for the modules that are typically skipped for AJAX script endpoints |
ALL | Combination of almost all modules that can be disabled |
API_ENDPOINT | shorthand for the modules that are typically skipped for API endpoints |
API_ENDPOINT_LAX | shorthand for the modules that are typically skipped for API endpoints where you allow even those that are blocked to access the endpoint |
CSPReport | The CSP report |
EarlyUserDiscovery | early user discovery modules |
EmbeddedResources | Embedded resources rule |
IsBlocked | The manual is blocked rule, can be set by any user code by calling the Block() method from the IFirewall instance |
None | Indicates none set to be ignored or tested depending on the context |
RejectAddHockRequests | The reject add hock requests rule |
RejectAgentsConsideredMalicious | Reject requests from browsers and bots that are considered to be Malicious |
RejectAPIPenetrationAttempts | A penetration attempt made against the firewall management API |
RejectCommonVulnerabilitiesExposuresExploits | the attack is a common vulnerabilities and exposure |
RejectCrossSiteRequests | Reject access to a resource if not from internal domain or from a domain that is white-listed (protects HttpPost requests) |
RejectDDOS | The reject distributed denial of service request rule |
RejectHitRatioViolations | The reject hit ratio violations |
RejectHoneyPotTrap | reject users making use of a ^known honey-pot trap |
RejectIntentions | reject a request based on browser intentions |
RejectInvalidUserPageGroupHeader | reject those that have an invalid PageGroup identifier. |
RejectInvalidUserSalt | User presented the wrong cipher salt to the response or request |
RejectInvalidUserSessionHeaderId | Invalid session header in request |
RejectInvalidUserSessionId | Reject those that have the wrong firewall session id |
RejectKnownBadBoys | The reject known bad boys rule |
RejectNavigation | reject or allow a request based on links rendered to the user |
RejectNonAspNet | The request is a non ASP net request rule |
RejectPenetrationAttempts | Reject penetration attempts rule |
RejectPhsishing | early user discovery modules |
RejectPoisonedCookies | Reject requests where the firewall detects poisoned cookies |
RejectRefreshViolations | The reject refresh violations rule |
RejectRejectWhoisProvider | Reject requests if the Internet service provider is having the wrong reputation for a user target user group |
RejectRepeatViolations | The reject known bad boys that are causing repeat violations |
RejectScrubbing | The reject scrubbing rule |
RejectSemanticUrlAttack | Reject semantic url attacks |
RejectSiteMapViolations | Reject access to endpoints that have not been rendered to a previous request |
RejectTor | The Attacker is using Tor this access is reject |
RejectWrongGeography | User access from the wrong geographic region |
RejectWrongProtocol | The reject wrong protocol requests rule |
RejectWrongUserType | The reject requests from wrong user category like IsHuman or distinction like IsMalliciouse types rule |
TCPResetAttack | A attempt is make to take the website off-line by flooding the site with connections that will be processed by the server but are never processed by the initiator |
System.Object
System.ValueType
System.Enum
Walter.Web.FireWall.Filters.FireWallGuardActions
Target Platforms: Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2