SQL injection detection is enabled by default. You can disable or enable the detection rules.
One piece of audited data can match only one SQL injection detection rule.
SQL injection detection is enabled by default. You can disable the detection rules as required. When an SQL injection detection rule is disabled, the audit rule does not take effect.
Only user-defined rules can be edited and deleted. Default rules can only be enabled and disabled.
When the status of an SQL injection detection rule is Disabled, SQL injection detection is disabled successfully.
Parameter |
Description |
Example Value |
---|---|---|
Name |
Name of an SQL rule. |
Postal Code SQL injection Rule |
Risk Level |
Level of risks matching a SQL rule. Its value can be:
|
Moderate |
Status |
Enables or disables an SQL injection rule.
|
|
Test Regular Expression |
Regular expression that checks for content in certain pattern. |
^\d{6}$ |
Data |
Content that matches the regular expression. Enter content and click Test to verify that the regular expression works properly. |
628307 |
Result |
Test result. It can be:
|
Hit |
When the status of an SQL injection detection rule is Enabled, SQL injection detection is enabled successfully.