Manual Chapter :
Configuring data manipulation detection on a URL or view
Applies To:
Show VersionsBIG-IP FPS
- 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.0
Configuring data manipulation detection on a URL or view
Configure data manipulation detection on a URL or
view according to content type of the HTTP request:
- If the URL or view sends or receives HTTP requests that are URL-encoded, configure parameters for the data manipulation detection to determine if parameter values were changed by malware after they left the user's web browser for the server.
- If the URL or view sends or receives HTTP request that are not URL-encoded, enable data manipulation detection on the Ajax payload of the URL or view to determine if there is a difference between the actual value of the Ajax payload sent by the client's browser and the expected value of the Ajax payload.
- On the Main tab, click.The Anti-Fraud Profiles screen opens.
- From the list of profiles, select the relevant profile.The Anti-Fraud Profile Properties screen opens.
- In the Anti-Fraud Configuration area, clickURL List.The URL List opens.
- Click the URL or view on which you want to configure the data manipulation check.The URL Properties (or View Properties) screen opens.
- In the URL Configuration (or View Configuration) area, selectAutomatic Transactions.The Automatic Transactions configuration options appear.
- Ensure that theEnabledcheck box forAutomatic Transactionsis selected.
- ForCheck AJAX Payload for Data Manipulation, selected theEnabledcheck box if you want the system to determine if data manipulation occurred on the complete payload of all AJAX requests.
- If you enableCheck AJAX Payload for Data Manipulation, the settingSend Payload in Alertsappears. Select theEnabledcheck box for this setting if you want the actual AJAX payload to be attached to data manipulation alerts.
- ForEnhanced Data Manipulation Check, select theEnabledcheck box if you want the system to detect data manipulation in real-time (while the user is actually entering data in an input field in the web page).
- If the URL or view sends or receives only HTTP requests that are not URL-encoded and you did not enableEnhanced Data Manipulation Check, clickSaveto complete the configuration and do not perform the following steps.Otherwise, perform the following steps.
- In the URL Configuration (or View Configuration) area, selectParameters.The Parameters list is displayed.
- Click theAddbutton.The Parameter Settings screen opens.
- In theParameter Namefield, choose one of the following types for the parameter name:
- Explicit: Assign a specific parameter name.
- Wildcard: Assign a wildcard expression for the parameter name. Any parameter name that matches the wildcard expression is considered legal and receives protection. For example, typing the wildcard expression*specifies that any parameter name is allowed.
- If you choseExplicit, type the parameter name.
- If you choseWildcard, type the wildcard expression.The syntax for wildcard entities is based on shell-style wildcard characters. This following table lists the wildcard characters that you can use so that the entity name matches multiple objects.Wildcard characterMatches*All characters?Any single character[abcde]Exactly one of the characters listed[!abcde]Any character not listed[a-e]Exactly one character in the range[!a-e]Any character not in the rangeIf a wildcard character is actually used as part of a parameter name and you don't want it to be treated as a wildcard character, use\and then the character to indicate that it should not be used as a wildcard character.A regular expression should not be used as part of the wildcard expression for a parameter name.
- If you enabledCheck AJAX Payload for Data Manipulation, in theName in Requesttext box, type a mapping key for the parameter that is sent from the client to the server.For example, if you have a single page application form with an input fieldname,ID, orSelectorcalledAand you want to send it in theBkey in the payload, typeBin this text box.If the input fieldname,ID, orSelectorin the HTML of your web page has the samename,ID, orSelectoras the key in the payload, you do not need to type a mapping key in this text box.
- In the Automatic Transactions section, select theCheck Data Manipulationcheck box.This attribute cannot be enabled on a parameter that already has theSubstitute Valueattribute.
- Select theSend in Alertscheck box if you want to include the value of the parameter in the information sent in alerts.
- ClickCreate.The parameter settings are saved.
- Repeat steps 11-16 for every parameter you want the system to check for data manipulation.
- If you enabledEnhanced Data Manipulation Checkand you have certain JavaScript functions that you want to permit modifying parameter values when the user enters data in the web page, do the following:
- In the URL/View Properties screen, clickAdvanced.The Advanced Automatic Transactions settings appear.
- AtEnhanced Data Manipulation Functions Whitelist, add the JavaScript functions that can modify parameter values.
- ClickSavein the URL Properties (or View Properties) screen.The configuration settings for the URL or view are saved and the Anti-Fraud Profile Properties screen opens.
The BIG-IP system is now set to detect data
manipulation on the URL or view, and sends an alert to the FPS Dashboard if
such activity is detected.