The BIG-IP Application Security Manager Part 2: Policy Building
This is the second article in a 10-part series on the BIG-IP Application Security Manager (ASM). The first article in this series discussed the basics of the BIG-IP ASM...what it is, why you need it,...
Published Sep 04, 2013
Version 1.0ltwagnon
Ret. Employee
Joined May 15, 2019
ltwagnon
Ret. Employee
Joined May 15, 2019
Anoop
Jun 22, 2018Nimbostratus
Hi John,
Thanks for wonderful article. I have one doubt. Suppose my policy enforcement mode is changed to blocking and signature staging is turned off. After couple of days if my application started receiving some new attacks which were not learned during transparent mode. How would i protect my application then ? Will it use attack signature database to download latest attacks and map to my policy ?