Forum Discussion
When to use "Apply Signatures to Responses" in policy building?
Ppp2016, usually attack signatures are only applied to http requests i.e. when bad XSS or SQLi attacks might be embedded in malicious requests. The use cases for applying attack signatures to Responses are, in the main, to prevent Information Disclosure i.e. to prevent MS SQL Database errors being returned to the end user. This might inform malicious persons of backend technologies in place i.e. fingerprinting the environment.
If you go to Attack Signatures in the GUI i think you can filter on signatures in regards Responses and you should see some sample signatures with more details on this.
It's best to create explicit file types and apply response signatures to these entities only, rather than the wildcard.
Hope this helps,
N
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com