Forum Discussion
ASM Policy to prevent backend server fingerprinting
We recently moved a legacy Windows web server behind an ASM. The server can't be upgraded for various reasons. We are not yet ready to deploy a full security policy in blocking mode, but we would at least like to prevent Shodan and other scanners from fingerprinting the backend server (e.g., determining OS version). How can we accomplish this?
Thanks.
- ragunath154Cirrostratus
apart from WAF policy i would recomend to attach the BOT profile, which includes scanners database to block.
ip intelligence too have database of scanner ip's which you can block..
Also the F5 ASM by default is removing by default the server response header which is nice:
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com