The detection and analysis of malicious requests is carried out basing on the rules. By defaults, Protecting uses the Core Rule Set provided by OWASP and fine-tuned by CyStack, as well as advanced rules developed by CyStack ourselves. Additionally, users can allow or deny requests basing on the IP address, country or user-agent. For IP addresses, Protecting supports IPv4 and IPv6 along with CIDR.

Did this answer your question?