SlideShare a Scribd company logo
1 of 44
Download to read offline
How to create a
query-based
white list
Create a query-based white list:
4 simple steps

1. Create a new Query Group
2. Create a new IPS/IDS rule
3. Create a new Database
   Firewall rule
4. Propagate the white list
   Query Group
1   Create a new
    Query Group
Step 1: Log on to the GreenSQL management GUI.
Step 1a: Click on the Policies icon at the top of the management screen.
Step 1b: Click on the Query Groups policy option to proceed to the query
         groups configuration function.
Step 1c: Click on the Create New button in order to create a new Query
         Group.
Step 1d: Give the new Query Group a meaningful name, e.g., "White
         List".
Step 1e: Choose your database type, e.g., MySQL.
Step 1f: Choose the proxy that protects your database type.
Step 1g: Choose the appropriate color for the newly created Query Group.
Step 1h: Click the Create button to finalize the configuration.
Step 1i: Check that the White List Query Group was created and displays
         in the Query Groups section.
2   Create a new
    IPS/IDS rule
Step 2 (optional): Minimize the floating notification bar for a better view
                   of the management GUI.
Step 2a: Click on Policy to create a new IPS/IDS (intruder prevention
         system/intruder detection system) rule.
Step 2b: Click on the Create New button.
Step 2c: Choose the Risk Based - IPS/IDS Rule Type.
Step 2d: Select the Database that the new rule will apply to.
Step 2e: Make sure that the Mode is set to Active Protection.
Step 2f: Make sure that the SQL Injection Detection box is checked.
Step 2g: Make sure that the Action is set to Block.
Step 2h: The Blocking action has a number of options; for this example,
         we will choose Close SQL Connection.
Step 2i: Make sure that the Logging option is set to Intrusion Events.
Step 2j: Scroll down and click the Create button to confirm rule creation.
Step 2k: Notice that our new Blocking rule, which defends our database
         against SQL injections, appears before the Allow Any rule.
3   Create a new
    Database
    Firewall rule
Step 3a: To create the White List rule, click on the Create New button.
Step 3b: Choose the Database Firewall Rule Type.
Step 3c: Select the Database that the new rule will apply to.
Step 3d: Choose Query Groups as the Firewall Type. Remember, we
         created the White List Query Group and now we want to use it.
Step 3e: Choose the White List Query Group we created earlier for this
         specific rule.
Step 3f: Select Allow as the Action, to allow White List queries to access
         the database.
Step 3g: Click Create to finalize rule creation.
Step 3h: Your policy should now contain three policy rules, as shown in
         the example above.
4   Propagate
    the white list
    query group
Step 4a: Now, we need to investigate if there are legitimate queries that
         were blocked by the SQL Injection rule. Click on the Logs icon.
Step 4b: Click on Intrusion Logs to look for legitimate blocked queries.
Step 4c: This example shows that there was an intrusion event. Click on
         the event to view the event details.
Step 4d: Scroll down in the event details to look for the Pattern field.
Step 4e: Review the pattern and note that this query is legitimate. Click
         on the pattern to add it to our White List Query Group.
Step 4f: Choose White List from the pop-up window and click Assign.
Step 4g: See that the new Query Group contains our white-listed pattern.
That’s it!
The white list is
configured and
operational.

More Related Content

Similar to Howto create a query based white list

Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3ganblues
 
SAP Business One Hana backup
SAP Business One Hana backupSAP Business One Hana backup
SAP Business One Hana backupAtif Bashir
 
GigaSpaces pet clinic demo
GigaSpaces pet clinic demoGigaSpaces pet clinic demo
GigaSpaces pet clinic demoNati Shalom
 
Sap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap querySap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap querySURESH BABU MUCHINTHALA
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheetMichael Gough
 
Database firewall policies copy
Database firewall policies   copyDatabase firewall policies   copy
Database firewall policies copyOracle Apps DBA
 
Big Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must KnowBig Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must KnowBernard Marr
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyMichael Gough
 
Admin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour BostonAdmin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour BostonSalesforce Admins
 
Step by Step design cube using SSAS
Step by Step design cube using SSASStep by Step design cube using SSAS
Step by Step design cube using SSASAhsan Kabir
 
GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6Shay Hassidim
 
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2Shay Hassidim
 
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data WarehouseJaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data WarehouseThiago Bottoni
 

Similar to Howto create a query based white list (20)

Hpalm
HpalmHpalm
Hpalm
 
Login methodology for Primavera V8.3 (EPPM)
Login methodology for Primavera V8.3 (EPPM)Login methodology for Primavera V8.3 (EPPM)
Login methodology for Primavera V8.3 (EPPM)
 
How To Set Up Insightly CRM
How To Set Up Insightly CRMHow To Set Up Insightly CRM
How To Set Up Insightly CRM
 
Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3
 
SAP Business One Hana backup
SAP Business One Hana backupSAP Business One Hana backup
SAP Business One Hana backup
 
GigaSpaces pet clinic demo
GigaSpaces pet clinic demoGigaSpaces pet clinic demo
GigaSpaces pet clinic demo
 
Wiki sap query
Wiki sap queryWiki sap query
Wiki sap query
 
Sap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap querySap query creation & transcation code creation for sap query
Sap query creation & transcation code creation for sap query
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Database firewall policies copy
Database firewall policies   copyDatabase firewall policies   copy
Database firewall policies copy
 
Big Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must KnowBig Data: The 4 Layers Everyone Must Know
Big Data: The 4 Layers Everyone Must Know
 
Cpanel Guide
Cpanel GuideCpanel Guide
Cpanel Guide
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
 
Sale Record System
Sale Record SystemSale Record System
Sale Record System
 
Admin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour BostonAdmin Habits & Hacks Handout - Salesforce World Tour Boston
Admin Habits & Hacks Handout - Salesforce World Tour Boston
 
Step by Step design cube using SSAS
Step by Step design cube using SSASStep by Step design cube using SSAS
Step by Step design cube using SSAS
 
Manual book
Manual bookManual book
Manual book
 
GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6GigaSpaces CCF Quick Tour - 2.3.6
GigaSpaces CCF Quick Tour - 2.3.6
 
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
 
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data WarehouseJaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
Jaspersoft and Clarity PPM - Advanced Reporting with Data Warehouse
 

Recently uploaded

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

Howto create a query based white list

  • 1. How to create a query-based white list
  • 2. Create a query-based white list: 4 simple steps 1. Create a new Query Group 2. Create a new IPS/IDS rule 3. Create a new Database Firewall rule 4. Propagate the white list Query Group
  • 3. 1 Create a new Query Group
  • 4. Step 1: Log on to the GreenSQL management GUI.
  • 5. Step 1a: Click on the Policies icon at the top of the management screen.
  • 6. Step 1b: Click on the Query Groups policy option to proceed to the query groups configuration function.
  • 7. Step 1c: Click on the Create New button in order to create a new Query Group.
  • 8. Step 1d: Give the new Query Group a meaningful name, e.g., "White List".
  • 9. Step 1e: Choose your database type, e.g., MySQL.
  • 10. Step 1f: Choose the proxy that protects your database type.
  • 11. Step 1g: Choose the appropriate color for the newly created Query Group.
  • 12. Step 1h: Click the Create button to finalize the configuration.
  • 13. Step 1i: Check that the White List Query Group was created and displays in the Query Groups section.
  • 14. 2 Create a new IPS/IDS rule
  • 15. Step 2 (optional): Minimize the floating notification bar for a better view of the management GUI.
  • 16. Step 2a: Click on Policy to create a new IPS/IDS (intruder prevention system/intruder detection system) rule.
  • 17. Step 2b: Click on the Create New button.
  • 18. Step 2c: Choose the Risk Based - IPS/IDS Rule Type.
  • 19. Step 2d: Select the Database that the new rule will apply to.
  • 20. Step 2e: Make sure that the Mode is set to Active Protection.
  • 21. Step 2f: Make sure that the SQL Injection Detection box is checked.
  • 22. Step 2g: Make sure that the Action is set to Block.
  • 23. Step 2h: The Blocking action has a number of options; for this example, we will choose Close SQL Connection.
  • 24. Step 2i: Make sure that the Logging option is set to Intrusion Events.
  • 25. Step 2j: Scroll down and click the Create button to confirm rule creation.
  • 26. Step 2k: Notice that our new Blocking rule, which defends our database against SQL injections, appears before the Allow Any rule.
  • 27. 3 Create a new Database Firewall rule
  • 28. Step 3a: To create the White List rule, click on the Create New button.
  • 29. Step 3b: Choose the Database Firewall Rule Type.
  • 30. Step 3c: Select the Database that the new rule will apply to.
  • 31. Step 3d: Choose Query Groups as the Firewall Type. Remember, we created the White List Query Group and now we want to use it.
  • 32. Step 3e: Choose the White List Query Group we created earlier for this specific rule.
  • 33. Step 3f: Select Allow as the Action, to allow White List queries to access the database.
  • 34. Step 3g: Click Create to finalize rule creation.
  • 35. Step 3h: Your policy should now contain three policy rules, as shown in the example above.
  • 36. 4 Propagate the white list query group
  • 37. Step 4a: Now, we need to investigate if there are legitimate queries that were blocked by the SQL Injection rule. Click on the Logs icon.
  • 38. Step 4b: Click on Intrusion Logs to look for legitimate blocked queries.
  • 39. Step 4c: This example shows that there was an intrusion event. Click on the event to view the event details.
  • 40. Step 4d: Scroll down in the event details to look for the Pattern field.
  • 41. Step 4e: Review the pattern and note that this query is legitimate. Click on the pattern to add it to our White List Query Group.
  • 42. Step 4f: Choose White List from the pop-up window and click Assign.
  • 43. Step 4g: See that the new Query Group contains our white-listed pattern.
  • 44. That’s it! The white list is configured and operational.