Updated on 2024-10-31 GMT+08:00

Configuration Guidance

How EdgeSec Engine Works

The built-in protection rules of EdgeSec help you defend against common web application attacks, including XSS attacks, SQL injection, crawlers, and web shells. You can customize protection rules to let EdgeSec better protect your website services using these custom rules. Figure 1 shows how EdgeSec engine built-in protection rules work. Figure 2 shows the detection sequence of user-defined rules.

Figure 1 EdgeSec engine detection process
Figure 2 Priorities of custom protection rules
Response actions
  • Pass: The current request is unconditionally permitted after a protection rule is matched.
  • Block: The current request is blocked after a rule is matched.
  • CAPTCHA: The system will perform human-machine verification after a rule is matched.
  • Redirect: The system will notify you to redirect the request after a rule is matched.
  • Log: Only attack information is recorded after a rule is matched.
  • Mask: The system will anonymize sensitive information after a rule is matched.

Protection Rule Configuration Methods

EdgeSec provides the following customized configuration methods to simplify the configuration process. Select a proper configuration method to meet your service requirements.

This method is recommended when you have few domain name services or have different configuration rules for domain name services.

After a domain name is added, EdgeSec automatically associates a protection policy with the domain name, and protection rules configured for the domain name are also added to the protection policy by default. If there are domain names applicable to the protection policy, you can directly add them to the policy. For details, see Applying a Policy to Your Website.