Enabling or Disabling SQL Injection Detection
SQL injection detection is enabled by default. You can disable or enable the detection rules.
One piece of audited data can match only one SQL injection detection rule.
Prerequisites
- You have purchased a database audit instance and the Status is Running.
- You can enable SQL injection detection when the status is Disabled.
- You can disable SQL injection detection when the status is Enabled.
Enabling SQL Injection Detection
SQL injection detection is enabled by default. You can disable the detection rules as required. When an SQL injection detection rule is disabled, the audit rule does not take effect.
- Log in to the management console.
- Select a region, click , and choose . The Dashboard page is displayed.
- In the navigation tree, choose Rules.
- In the Instance drop-down list, select the instance for which you want to disable SQL injection detection.
- Click the SQL Injection tab.
- Locate the target rule, and click Set Priority in the Operation column. In the displayed dialog box, select a priority. The smallest number indicates the highest priority. Click OK.
Figure 1 Configuring the priority
- Locate the target rule, and click Disable in the Operation column. See Figure 2.
When the status of an SQL injection detection rule is Disabled, SQL injection detection is disabled successfully.
- Locate the target rule, and click Edit in the Operation column. Configure parameters and click OK. For more information, see Table 1.
Figure 3 Editing an SQL injection rule
Table 1 SQL injection rule parameters Parameter
Description
Example Value
Name
Name of an SQL rule.
Postal Code SQL injection Rule
Risk Level
Level of risks matching a SQL rule. Its value can be:
- High
- Moderate
- Low
- No risk
Moderate
Status
Enables or disables an SQL injection rule.
- : enabled
- : disabled
Test Regular Expression
Regular expression that checks for content in certain pattern.
^\d{6}$
Data
Content that matches the regular expression.
Enter content and click Test to verify that the regular expression works properly.
628307
Result
Test result. It can be:
- Hit
- Miss
NOTE:
If the test result is Hit, the regular expression is correct.
If the test result is Miss, the regular expression is incorrect.
Hit
- In the Operation column, click Delete.
Follow-Up Procedure
When the status of an SQL injection detection rule is Enabled, SQL injection detection is enabled successfully.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.