Rules that can allow, block, or count web requests that meet the specifiedĬriteria. Presence of a script that is likely to be malicious (known as cross-site scripting). Presence of SQL code that is likely to be malicious (known as SQL injection). Match regular expression (regex) patterns. Strings that appear in requests, either specific strings or strings that IP addresses that requests originate from. Run CAPTCHA or challenge checks against requests that match yourĬriteria – You can implement CAPTCHA and silent challenge controlsĪgainst requests to help reduce bot traffic to your protected resources. Switch your rules to allow or block matching requests. This lets you confirm your new configuration settings before you The web requests, you can first configure AWS WAF to count the requests that match When you want to allow or block requests based on new properties in You can use this for general monitoring and also to test your new web request Use the Count action to track your web traffic without modifying how you handle it. Requests, such as the IP addresses that they use to browse to the website.Ĭount requests that match your criteria – You can Restricted website whose users are readily identifiable by properties in web Specify – This is useful when you want to serve content for a Serve content for a public website, but you also want to block requests fromīlock all requests except the ones that you Specify – This is useful when you want Amazon CloudFront, Amazon API Gateway, Application Load Balancer, AWS AppSync, Amazon Cognito, AWS App Runner, or AWS Verified Access to Allow all requests except the ones that you
0 Comments
Leave a Reply. |