WAF Security Rules
Configure and customize your Web Application Firewall protection rules.
Rule Groups
OWASP Core Rule Set
- Purpose: Industry-standard protection against common attacks
- Coverage: SQL injection, XSS, file inclusion, and more
- Recommendation: Always keep enabled for baseline security
WordPress Rules
- Purpose: Specialized protection for WordPress sites
- Coverage: Login attacks, plugin vulnerabilities, theme exploits
- When to Use: Enable if your site runs on WordPress
Custom Rules
- Purpose: Site-specific protection rules
- Coverage: Your unique security requirements
- Management: Create, edit, and disable custom rules
Protection Levels
Low Sensitivity
- Best for: Development sites, internal applications
- Behavior: Fewer false positives, may miss some attacks
- Risk: Lower protection, higher chance of attack success
Medium Sensitivity (Recommended)
- Best for: Most production websites
- Behavior: Balanced protection with minimal false positives
- Risk: Good protection with reasonable false positive rate
High Sensitivity
- Best for: High-security environments, sensitive data
- Behavior: Maximum protection, may block legitimate traffic
- Risk: Highest protection, requires careful tuning
Rule Configuration
Enabling/Disabling Rules
- Go to Sites → Select your site → WAF Tab
- Choose rule groups to enable or disable
- Toggle individual rules within groups
- Save changes to apply new configuration
Custom Exceptions
- IP Whitelisting: Allow trusted IP addresses to bypass rules
- Path Exclusions: Disable protection for specific URLs
- Parameter Exclusions: Allow specific form fields or parameters
Common Rule Types
SQL Injection Protection
- Rule IDs: 942xxx series
- Purpose: Block database manipulation attempts
- Examples: Login form attacks, URL parameter injection
Cross-Site Scripting (XSS)
- Rule IDs: 941xxx series
- Purpose: Prevent malicious script injection
- Examples: Comment form attacks, search field exploits
File Inclusion Attacks
- Rule IDs: 930xxx series
- Purpose: Block unauthorized file access attempts
- Examples: Path traversal, remote file inclusion
Brute Force Protection
- Rule IDs: 912xxx series
- Purpose: Limit automated login attempts
- Examples: Password guessing, credential stuffing
Rule Tuning
Reducing False Positives
- Review blocked requests in security logs
- Identify legitimate traffic being blocked
- Create exceptions for specific IPs or paths
- Lower sensitivity if needed for specific rules
Increasing Protection
- Enable additional rule groups for your site type
- Increase sensitivity level for critical applications
- Add custom rules for specific threats
- Monitor logs for new attack patterns
Best Practices
Regular Review
- Weekly: Check for new false positives
- Monthly: Review rule effectiveness
- Quarterly: Update rule sets and configurations
Testing Changes
- Staging Environment: Test rule changes before production
- Gradual Rollout: Enable new rules incrementally
- Monitor Impact: Watch for legitimate traffic blocks
Documentation
- Change Log: Record all rule modifications
- Exception Reasons: Document why exceptions were created
- Performance Impact: Monitor rule processing overhead
Need Help?
- 💬 Live Chat: Get help configuring WAF rules
- 📧 Email Support: support@atomicedge.io
- 🛡️ Managed Security: Let our experts manage your rules (Enterprise)