4 1) The modsecurity_crs_10_config.conf file includes management rules and directives
5 that can control important CRS functions. Pay attention to
6 the SecRuleEngine setting (On by default) and that the SecDefaultAction
7 directive is set to "pass". The 49 inbound blocking and 59 outbound blocking
8 rules files use the "block" action which
9 inherits this setting. The effectively means that you can toggle the
10 SecDefaultAction setting to decide if you would like to deny on an
11 anomaly scoring/correlation match.
13 Update the PARANOID_MODE variable setting if you want to become more
14 aggressive in your detection. Caution - this will cause more false positives.
16 Should also update the appropriate anomaly scoring levels that will be propagated
17 to the inbound/outbound blocking files.
19 Update the TX policy settings for allowed Request Methods, File Extensions, etc...
21 2) Enable the CRS rules files you want to use by creating symlinks under the
22 "activated_rules" directory location. You will want to create symlinks for the
25 ==> $ cd /etc/httpd/conf/crs/
26 ==> $ for i in base_rules/* ; do ln -s $i activated_rules/$i ; done
27 ==> $ for i in $(ls optional_rules/ | grep comment_spam) ; do ln -s $i activated_rules/$i ; done
30 3) Add the following line to your httpd.conf (assuming
31 you've placed the rule files into conf/crs/):
33 <IfModule security2_module>
34 Include conf/crs/modsecurity_crs_10_config.conf
35 Include conf/crs/activated_rules/*.conf
38 4) Restart web server.
46 1) The modsecurity_crs_10_config.conf file includes management rules and directives
47 that can control important CRS functions. Pay attention to
48 the SecRuleEngine setting (On by default) and that the SecDefaultAction
49 directive is set to "pass". The 49 inbound blocking and 59 outbound blocking
50 rules files use the "block" action which
51 inherits this setting. The effectively means that you can toggle the
52 SecDefaultAction setting to decide if you would like to deny on an
53 anomaly scoring/correlation match.
55 Update the PARANOID_MODE variable setting if you want to become more
56 aggressive in your detection. Caution - this will cause more false positives.
58 Should also update the appropriate anomaly scoring levels that will be propagated
59 to the inbound/outbound blocking files.
61 Update the TX policy settings for allowed Request Methods, File Extensions, etc...
63 2) Enable the CRS rules files you want to use by creating symlinks under the
64 "activated_rules" directory location. You will want to create symlinks for the
67 ==> $ cd /etc/httpd/conf/crs/
68 ==> $ for i in base_rules/* ; do ln -s $i activated_rules/$i ; done
69 ==> $ for i in $(ls optional_rules/ | grep comment_spam) ; do ln -s $i activated_rules/$i ; done
72 3) Add the following line to your httpd.conf (assuming
73 you've placed the rule files into conf/crs/):
75 <IfModule security2_module>
76 Include conf/crs/modsecurity_crs_10_config.conf
77 Include conf/crs/activated_rules/*.conf
80 4) Restart web server.
85 # vim:set ts=2 sw=2 et: