WAF 351000
Rule ID
351000
Status
Active rule currently published.
Alert Message
Atomicorp.com Upload Malware Scanner: Malicious File upload attempt detected and blocked
Description
This rule use the ASL malicious upload scanning engine. This rule will trigger if the malicious upload scanning engine detects that a user attempted to upload a potentially malicious file.
False Positives
The rule itself can not generate a false positive, however it is possible that the malicious upload scanning engine may have a signature that is incorrectly labeling a non-malicious file as malicious.
If you believe you have a false positive, do not disable this rule. That will disable the malicious upload scanning engine for all web uploads.
Please send us the file if you believe it is not malicious, and be sure to put a password on the file so it is not stopped by any antivirus or antimalware software.
Tuning Guidance
None.
Similar Rules None.
Knowledge Base Articles
None.
Outside References
None.