Enabling or Disabling SQL Injection Detection
SQL injection detection is enabled by default. You can disable or enable the detection rules.
One piece of audited data can match only one SQL injection detection rule.
Prerequisites
- You have purchased a database audit instance and the Status is Running.
- You can enable SQL injection detection when the status is Disabled.
- You can disable SQL injection detection when the status is Enabled.
Disabling SQL Injection Detection
SQL injection detection is enabled by default. You can disable the detection rules as required. When an SQL injection detection rule is disabled, the audit rule does not take effect.
- Log in to the management console.
- Select a region, click , and choose . The Dashboard page is displayed.
- In the navigation tree, choose Rules.
- In the Instance drop-down list, select the instance for which you want to disable SQL injection detection.
- Click the SQL Injection tab.
Only user-defined rules can be edited and deleted. Default rules can only be enabled and disabled.
- In the Operation column of a rule, click Set Priority. In the displayed dialog box, select a priority. The smallest number indicates the highest priority. Click OK.
Figure 1 Configuring the priority
- Locate the SQL injection rule you want to disable, and click Disable in the Operation column.
Figure 2 Disabling an SQL injection detection rule
When the status of an SQL injection detection rule is Disabled, SQL injection detection is disabled successfully.
- In the Operation column of a rule, click Edit. Configure parameters and click OK.
Figure 3 Editing an SQL injection rule
Table 1 SQL injection rule parameters Parameter
Description
Example Value
Name
Name of an SQL rule.
Postal Code SQL injection Rule
Risk Level
Level of risks matching a SQL rule. Its value can be:
- High
- Moderate
- Low
- No risk
Moderate
Status
Enables or disables an SQL injection rule.
- : enabled
- : disabled
Test Regular Expression
Regular expression that checks for content in certain pattern.
^\d{6}$
Data
Content that matches the regular expression.
Enter content and click Test to verify that the regular expression works properly.
628307
Result
Test result. It can be:
- Hit
- Miss
NOTE:
If the test result is Hit, the regular expression is correct.
If the test result is Miss, the regular expression is incorrect.
Hit
- In the Operation column, click Delete.
Follow-Up Procedure
When the status of an SQL injection detection rule is Enabled, SQL injection detection is enabled successfully.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot