SlideShare a Scribd company logo
How to create a
query-based
white list
Create a query-based white list:
4 simple steps

1. Create a new Query Group
2. Create a new IPS/IDS rule
3. Create a new Database
   Firewall rule
4. Propagate the white list
   Query Group
1   Create a new
    Query Group
Step 1: Log on to the GreenSQL management GUI.
Step 1a: Click on the Policies icon at the top of the management screen.
Step 1b: Click on the Query Groups policy option to proceed to the query
         groups configuration function.
Step 1c: Click on the Create New button in order to create a new Query
         Group.
Step 1d: Give the new Query Group a meaningful name, e.g., "White
         List".
Step 1e: Choose your database type, e.g., MySQL.
Step 1f: Choose the proxy that protects your database type.
Step 1g: Choose the appropriate color for the newly created Query Group.
Step 1h: Click the Create button to finalize the configuration.
Step 1i: Check that the White List Query Group was created and displays
         in the Query Groups section.
2   Create a new
    IPS/IDS rule
Step 2 (optional): Minimize the floating notification bar for a better view
                   of the management GUI.
Step 2a: Click on Policy to create a new IPS/IDS (intruder prevention
         system/intruder detection system) rule.
Step 2b: Click on the Create New button.
Step 2c: Choose the Risk Based - IPS/IDS Rule Type.
Step 2d: Select the Database that the new rule will apply to.
Step 2e: Make sure that the Mode is set to Active Protection.
Step 2f: Make sure that the SQL Injection Detection box is checked.
Step 2g: Make sure that the Action is set to Block.
Step 2h: The Blocking action has a number of options; for this example,
         we will choose Close SQL Connection.
Step 2i: Make sure that the Logging option is set to Intrusion Events.
Step 2j: Scroll down and click the Create button to confirm rule creation.
Step 2k: Notice that our new Blocking rule, which defends our database
         against SQL injections, appears before the Allow Any rule.
3   Create a new
    Database
    Firewall rule
Step 3a: To create the White List rule, click on the Create New button.
Step 3b: Choose the Database Firewall Rule Type.
Step 3c: Select the Database that the new rule will apply to.
Step 3d: Choose Query Groups as the Firewall Type. Remember, we
         created the White List Query Group and now we want to use it.
Step 3e: Choose the White List Query Group we created earlier for this
         specific rule.
Step 3f: Select Allow as the Action, to allow White List queries to access
         the database.
Step 3g: Click Create to finalize rule creation.
Step 3h: Your policy should now contain three policy rules, as shown in
         the example above.
4   Propagate
    the white list
    query group
Step 4a: Now, we need to investigate if there are legitimate queries that
         were blocked by the SQL Injection rule. Click on the Logs icon.
Step 4b: Click on Intrusion Logs to look for legitimate blocked queries.
Step 4c: This example shows that there was an intrusion event. Click on
         the event to view the event details.
Step 4d: Scroll down in the event details to look for the Pattern field.
Step 4e: Review the pattern and note that this query is legitimate. Click
         on the pattern to add it to our White List Query Group.
Step 4f: Choose White List from the pop-up window and click Assign.
Step 4g: See that the new Query Group contains our white-listed pattern.
That’s it!
The white list is
configured and
operational.

More Related Content

Similar to Howto create a query based white list

Hpalm
HpalmHpalm
Hpalm
satu2412
 
Login methodology for Primavera V8.3 (EPPM)
Login methodology for Primavera V8.3 (EPPM)Login methodology for Primavera V8.3 (EPPM)
Login methodology for Primavera V8.3 (EPPM)
CADD Centre Software Solutions Private Limited
 
How To Set Up Insightly CRM
How To Set Up Insightly CRMHow To Set Up Insightly CRM
How To Set Up Insightly CRM
Fit Small Business
 
Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3ganblues
 
SAP Business One Hana backup
SAP Business One Hana backupSAP Business One Hana backup
SAP Business One Hana backup
Atif Bashir
 
GigaSpaces pet clinic demo
GigaSpaces pet clinic demoGigaSpaces pet clinic demo
GigaSpaces pet clinic demo
Nati Shalom
 
Wiki sap query
Wiki sap queryWiki sap query
Wiki sap query
masoomjajoo
 
Sap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap querySap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap query
SURESH BABU MUCHINTHALA
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
Michael Gough
 
Database firewall policies copy
Database firewall policies   copyDatabase firewall policies   copy
Database firewall policies copy
Oracle Apps DBA
 
Big Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must KnowBig Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must Know
Bernard Marr
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Michael Gough
 
Sale Record System
Sale Record SystemSale Record System
Sale Record System
kalpita surve
 
Admin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour BostonAdmin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour Boston
Salesforce Admins
 
Step by Step design cube using SSAS
Step by Step design cube using SSASStep by Step design cube using SSAS
Step by Step design cube using SSAS
Ahsan Kabir
 
GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6
Shay Hassidim
 
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
Shay Hassidim
 
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data WarehouseJaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Thiago Bottoni
 

Similar to Howto create a query based white list (20)

Hpalm
HpalmHpalm
Hpalm
 
Login methodology for Primavera V8.3 (EPPM)
Login methodology for Primavera V8.3 (EPPM)Login methodology for Primavera V8.3 (EPPM)
Login methodology for Primavera V8.3 (EPPM)
 
How To Set Up Insightly CRM
How To Set Up Insightly CRMHow To Set Up Insightly CRM
How To Set Up Insightly CRM
 
Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3
 
SAP Business One Hana backup
SAP Business One Hana backupSAP Business One Hana backup
SAP Business One Hana backup
 
GigaSpaces pet clinic demo
GigaSpaces pet clinic demoGigaSpaces pet clinic demo
GigaSpaces pet clinic demo
 
Wiki sap query
Wiki sap queryWiki sap query
Wiki sap query
 
Sap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap querySap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap query
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Database firewall policies copy
Database firewall policies   copyDatabase firewall policies   copy
Database firewall policies copy
 
Big Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must KnowBig Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must Know
 
Cpanel Guide
Cpanel GuideCpanel Guide
Cpanel Guide
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
 
Sale Record System
Sale Record SystemSale Record System
Sale Record System
 
Admin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour BostonAdmin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour Boston
 
Step by Step design cube using SSAS
Step by Step design cube using SSASStep by Step design cube using SSAS
Step by Step design cube using SSAS
 
Manual book
Manual bookManual book
Manual book
 
GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6
 
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
 
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data WarehouseJaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Howto create a query based white list

  • 1. How to create a query-based white list
  • 2. Create a query-based white list: 4 simple steps 1. Create a new Query Group 2. Create a new IPS/IDS rule 3. Create a new Database Firewall rule 4. Propagate the white list Query Group
  • 3. 1 Create a new Query Group
  • 4. Step 1: Log on to the GreenSQL management GUI.
  • 5. Step 1a: Click on the Policies icon at the top of the management screen.
  • 6. Step 1b: Click on the Query Groups policy option to proceed to the query groups configuration function.
  • 7. Step 1c: Click on the Create New button in order to create a new Query Group.
  • 8. Step 1d: Give the new Query Group a meaningful name, e.g., "White List".
  • 9. Step 1e: Choose your database type, e.g., MySQL.
  • 10. Step 1f: Choose the proxy that protects your database type.
  • 11. Step 1g: Choose the appropriate color for the newly created Query Group.
  • 12. Step 1h: Click the Create button to finalize the configuration.
  • 13. Step 1i: Check that the White List Query Group was created and displays in the Query Groups section.
  • 14. 2 Create a new IPS/IDS rule
  • 15. Step 2 (optional): Minimize the floating notification bar for a better view of the management GUI.
  • 16. Step 2a: Click on Policy to create a new IPS/IDS (intruder prevention system/intruder detection system) rule.
  • 17. Step 2b: Click on the Create New button.
  • 18. Step 2c: Choose the Risk Based - IPS/IDS Rule Type.
  • 19. Step 2d: Select the Database that the new rule will apply to.
  • 20. Step 2e: Make sure that the Mode is set to Active Protection.
  • 21. Step 2f: Make sure that the SQL Injection Detection box is checked.
  • 22. Step 2g: Make sure that the Action is set to Block.
  • 23. Step 2h: The Blocking action has a number of options; for this example, we will choose Close SQL Connection.
  • 24. Step 2i: Make sure that the Logging option is set to Intrusion Events.
  • 25. Step 2j: Scroll down and click the Create button to confirm rule creation.
  • 26. Step 2k: Notice that our new Blocking rule, which defends our database against SQL injections, appears before the Allow Any rule.
  • 27. 3 Create a new Database Firewall rule
  • 28. Step 3a: To create the White List rule, click on the Create New button.
  • 29. Step 3b: Choose the Database Firewall Rule Type.
  • 30. Step 3c: Select the Database that the new rule will apply to.
  • 31. Step 3d: Choose Query Groups as the Firewall Type. Remember, we created the White List Query Group and now we want to use it.
  • 32. Step 3e: Choose the White List Query Group we created earlier for this specific rule.
  • 33. Step 3f: Select Allow as the Action, to allow White List queries to access the database.
  • 34. Step 3g: Click Create to finalize rule creation.
  • 35. Step 3h: Your policy should now contain three policy rules, as shown in the example above.
  • 36. 4 Propagate the white list query group
  • 37. Step 4a: Now, we need to investigate if there are legitimate queries that were blocked by the SQL Injection rule. Click on the Logs icon.
  • 38. Step 4b: Click on Intrusion Logs to look for legitimate blocked queries.
  • 39. Step 4c: This example shows that there was an intrusion event. Click on the event to view the event details.
  • 40. Step 4d: Scroll down in the event details to look for the Pattern field.
  • 41. Step 4e: Review the pattern and note that this query is legitimate. Click on the pattern to add it to our White List Query Group.
  • 42. Step 4f: Choose White List from the pop-up window and click Assign.
  • 43. Step 4g: See that the new Query Group contains our white-listed pattern.
  • 44. That’s it! The white list is configured and operational.