Difference between revisions of "WAF 381205"
(Created page with "{{Infobox |header1= Rule 381205 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules - Virtual Just In Time Patch: Curltest Probe }} = De...") |
Latest revision as of 17:29, 20 October 2012
Rule 381205 | |
---|---|
Status | Active |
Alert Message | Atomicorp.com WAF Rules - Virtual Just In Time Patch: Curltest Probe |
Contents |
[edit] Description
This rules detects if attempt is made to access the curltest web application. This may be an indication of an attack.
[edit] Troubleshooting
[edit] False Positives
A false positive can occur if you allow access to the curltest web application.
Please do not report false positives in cases where you allow access to this application. The rule is designed to detect attempts to access this web application. If you wish to allow access to this web application, simply disable this rule. If the request was not access the curltest webapplication, please report this as a false positive to our support team.
[edit] Tuning Guidance
If you know that this behavior is acceptable for your domain, you can either disable the rule for the server, or you can disable it for the application.
Please see the Tuning the Atomicorp WAF Rules page for basic information.
[edit] Additional Information
[edit] Similar Rules
None.
[edit] Knowledge Base Articles
None.
[edit] Outside References
None.
[edit] Notes
None.