To configure the scanning details, complete the following sections:
Additional message parts to scan:
This section configures what parts of the incoming request are scanned
for threatening content. By default, the Threatening Content
filter acts on the request body. However, it can also scan the HTTP headers
and the request query string for threatening content. Select the appropriate
checkboxes to indicate what additional parts of the request message you want
to scan.
Blacklist:
The table lists all the regular expressions that have been added to the
global Black list. These regular expressions are used
to identify threatening content. For example, there are regular
expressions to match SQL syntax, ASCII control characters, and XML
processing instructions, all of which can be used to attack a Web
Service. For more information on how to configure these global
regular expressions, see the
Black
list topic.
Select the regular expressions that you want to run against incoming
requests using the checkboxes in the table. You can add new expressions
using the Add button. It is important to note
that when adding new regular expressions on the
Add Regular Expression dialog, the expressions are
added to the global Black list library.
You can edit or remove existing regular expressions by selecting the
expression in the tree, and selecting the Edit or
Delete button.
|