Reviewed-by: Gode, Sebastian <sebastian.gode@t-systems.com> Co-authored-by: Hasko, Vladimir <vladimir.hasko@t-systems.com> Co-committed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com>
16 lines
1.1 KiB
ReStructuredText
16 lines
1.1 KiB
ReStructuredText
Dedicated Web Application Firewall
|
|
==================================
|
|
|
|
Web Application Firewall (WAF) keeps web services stable and secure. It examines all HTTP and HTTPS requests to detect and block the following attacks: Structured Query Language (SQL) injection, cross-site scripting (XSS), webshells, command and code injections, file inclusion, sensitive file access, third-party vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery (CSRF).
|
|
|
|
|
|
.. directive_wrapper::
|
|
:class: container-sbv
|
|
|
|
.. service_card::
|
|
:environment: internal
|
|
:service_type: wafd
|
|
:umn: This document helps you know about the Web Application Firewall (Dedicated) and guide you on how to use the service.
|
|
:api-ref: This document describes application programming interfaces (APIs) of the Web Application Firewall (Dedicated) and provides API parameter description and example values.
|
|
:best-practice: To use Web Application Firewall (Dedicated) more securely, reliably, flexibly, and efficiently, you are advised to follow the following best practices.
|