The BIG-IP Application Security Manager Part 5: XML Security
This is the fifth article in a 10-part series on the BIG-IP Application Security Manager (ASM). The first four articles in this series are:
What is the BIG-IP ASM? Policy Building The Importanc...
Hello John,
Thank you for explaining web services and XML profile on ASM.
We have noticed many XML requests using Libreoffice user agent on ASM logs, is it worth to create XML policy for these requests or what is better way to handle them. ASM detects XML content as parameter and reports meta character violation.