Difference between revisions of "WAF 390150"
(Created page with "'''Rule ID''' 390150 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: Possible spamtool installed on system '''Description''' ...") |
Latest revision as of 13:41, 15 July 2011
Rule ID
390150
Status
Active rule currently published.
Alert Message
Atomicorp.com WAF Rules: Possible spamtool installed on system
Description
This rule detects if a running web pplication appears to be a known or suspected spamming tool. It does this by looking at the output from the application.
False Positives
A false positive can occur when an application legitimately behaves in a manner similar to a spamming tool, or if its output matches known patterns used by spamming tools. The rules contain a large library of known web applications and safe methods that a non-maliciouns, and can detect these known safe web applications and non-malicious methods and ignore them. However it is possible for a new or custom application to trigger this application and incorrectly trigger this rule.
It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
Tuning Guidance
If you know that this behavior is acceptable for your application, you can tune it by following the Tuning the Atomicorp WAF Rules page.
Similar Rules
Knowledge Base Articles
None.
Outside References
None.