Walter.Web.FireWall
UrlValidatedResult Enumeration
Walter.Web.FireWall Assembly > Walter.Web.FireWall.RuleEngine Namespace : UrlValidatedResult Enumeration
Enum UrlValidatedResult returns what rule was violated by the rule engine executing blockedPatterns
Syntax
public enum UrlValidatedResult : System.Enum 
Members
MemberDescription
AddhockFileAccess The add-hock file access
CrossSiteUrlDetected The cross site URL detected
DatabasesAreNotPubliclyAccessible The databases are not publicly accessible
NoAccessToPaymentSystem The no access to payment system
NoOnlinePaymentSystemExists The no on-line payment system exists
NoPublicAccessToAdministration The no public access to administration
NoPublicAccessToApplicationCodeAllowed The no public access to application code allowed
NoPublicAccessToBackupsAllowed The no public access to backups allowed
NoPublicAccessToConfigurationAllowed The no public access to configuration allowed
NoPublicAccessToFileDirectoryAllowed The no public access to file directory allowed
NoSuchDirectoryExists The no such directory exists
NotSupportedPlatform The not supported platform
NotUsedPlugin The not used plug-in
NoUserAuthenticationExists The no user authentication exists
OK The result is OK using the current rule-set
OperatingSystemAccessProhibited The operating system access prohibited
QueryParameterInjection Semantic URL attack detected as an query string is presented in such a way that it does not match the url's signature as parameters are added
QueryParameterManipulation Semantic URL attack detected as an query string is presented in such a way that it does not match the url's signature as parameters not compatible with the data type expected
QueryParameterOmission Semantic URL attack detected as an query string is presented in such a way that it does not match the url's signature as parameters are left out
RequestFromBlacklistedCountry The request from blacklisted country
RequestFromBlacklistedCountryOrAtBrowser The request from blacklisted country or at browser
RequestPerSecondLooksLikeScrubbingOrDDOS The request per second looks like scrubbing or DDOS
SaltExpired The salt expired
SaltFromCookieAndSaltProvidedDoNotMatch The salt from cookie and salt provided do not match
SaltWasNotProvidedInHeaderOfUrl The salt was not provided in header of URL
ScriptInjectionNotAllowed The script injection not allowed
UrlFishingSuspected The URL fishing suspected
Inheritance Hierarchy

System.Object
   System.ValueType
      System.Enum
         Walter.Web.FireWall.RuleEngine.UrlValidatedResult

Requirements

Target Platforms: Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2

See Also

Reference

Walter.Web.FireWall.RuleEngine Namespace