Difference between revisions of "WAF 390501"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "{{Infobox |header1 = Rule 390501 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com Malware Script Blacklist: Known Malware detected in Request Fi...")
 

Latest revision as of 13:18, 24 August 2020

Rule 390501
Status Active
Alert Message Atomicorp.com Malware Script Blacklist: Known Malware detected in Request Filename

Contents

[edit] Description

This rule detects when a known malware filename has been detected in a request from a client to the server. Either the client is trying to load or find the malware on the system, for example a web shell, is is trying to install or upload the malware.

[edit] Troubleshooting

[edit] False Positives

There are no known false positives with this rule. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Do not disable this rule.

Instructions to report false positives are detailed on the Reporting False Positives wiki page.  If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.


[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

None.

[edit] Notes

None.

Personal tools