Last update:2024-01-11 16:17:15
In response to triggering rules, you can specify the response to be executed when a rule or security policy is triggered. You can choose from predefined actions or provide a custom response for denied operations. The supported actions include:
Trusted requests, which can specify that requests meeting certain conditions do not undergo specific security checks.
Trusted requests can specify that certain security checks should not be performed for requests that meet certain criteria.
Publishing the configuration content of the current feature to the production environment, please handle with caution. After issuing the deployment task, it is expected to be completed in 2 minutes.
It is possible to synchronize certain configurations to multiple hostnames simultaneously. This operation will use the selected configuration items of the current hostname to override the corresponding configuration items of the selected hostnames during deployment.
Specify the range of requests that the security policy needs to detect through conditions such as specified paths, APIs, IPs, request headers, etc.
When a request triggers a security policy, the duration of the response action is maintained. This can limit requests that occur at a high rate.
Shared configuration is a configuration that can be used in multiple security policies or multiple hostnames. The purpose is to define and update it in one place, and all hostnames using it will be automatically updated. This eliminates the need to repeatedly configure the same settings in multiple hostnames.