You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With App and API Protection (AAP) enabled, the Datadog tracing library actively monitors all web services and API requests for suspicious security activity.
11
12
12
-
An _In-App WAF rule_ specifies conditions on the incoming request to define what the library considers suspicious. The Datadog tracing library includes hundreds of out-of-the-box AAP In-App WAF rules, which are used to display security traces in the trace explorer and in the default signal rules.
13
+
An _In-App WAF rule_ specifies conditions on the incoming request to define what the library considers suspicious. The Datadog tracing library includes hundreds of out-of-the-box AAP In-App WAF rules, which are used to display security traces in the trace explorer and in the default signal rules.
13
14
14
-
You can add to the In-App WAF rules without upgrading the tracing library.
15
+
You can add to the In-App WAF rules without upgrading the tracing library.
15
16
16
17
## Structure of an AAP In-App WAF rule
17
18
@@ -33,7 +34,7 @@ An input represents which part of the request the operator is applied to. The fo
33
34
|`server.request.body`| The parsed HTTP body (key/value map) |`data.items[0] => value0, data.items[1] => value1`|
34
35
|`server.response.status`| The http status code |`200`|
35
36
36
-
#### Operators
37
+
#### Operators
37
38
38
39
| name | Description |
39
40
|------|-------------|
@@ -46,7 +47,7 @@ An input represents which part of the request the operator is applied to. The fo
46
47
47
48
Custom In-App WAF rules enable users to log or block specific types of requests to their applications. For example, you can use custom rules to monitor login success or failure. To get started, navigate to **Security** -> **App and API Protection** -> **Policies** -> **In-App WAF** -> [**Custom Rules**][4].
48
49
49
-
**Note:** Default rules in In-App WAF are read-only. To refine your In-App WAF behavior, modify the In-App WAF rules. Default rules cannot be modified, however, you can create a custom rule based on one of the default rules, and modify the match conditions to your needs. Be sure to disable the default rule so that you don't have two similar rules evaluating the same requests.
50
+
**Note:** Default rules in In-App WAF are read-only. To refine your In-App WAF behavior, modify the In-App WAF rules. Default rules cannot be modified, however, you can create a custom rule based on one of the default rules, and modify the match conditions to your needs. Be sure to disable the default rule so that you don't have two similar rules evaluating the same requests.
50
51
51
52
## Configure an AAP In-App WAF rule
52
53
@@ -97,7 +98,7 @@ Services using a policy are visible directly in the policy management page.
97
98
98
99
4. Using a utility such as SCP or FTP, copy the `appsec-rules.json` file to your application server, for example, `/home/asm/appsec-rules.json`.
99
100
100
-
5. Following the instructions in [Enabling AAP][3] for adding application variables in your environment, add the `DD_APPSEC_RULES` environment variable to your service with the full path to the file:
101
+
5. Following the instructions in [Enabling AAP][3] for adding application variables in your environment, add the `DD_APPSEC_RULES` environment variable to your service with the full path to the file:
101
102
```
102
103
DD_APPSEC_RULES=/home/asm/appsec-rules.json
103
104
```
@@ -106,7 +107,7 @@ Services using a policy are visible directly in the policy management page.
106
107
107
108
## What to do next
108
109
109
-
Next, [configure detection rules to create security signals][1] based on those security traces defined by the In-App WAF rules you created. You can modify the provided out-of-the-box AAP detection rules or create new ones.
110
+
Next, [configure detection rules to create security signals][1] based on those security traces defined by the In-App WAF rules you created. You can modify the provided out-of-the-box AAP detection rules or create new ones.
0 commit comments