The Web Application Firewall (WAF) is one of the key elements of Imunify’s web server protection system. It contains hundreds of rules to protect against all known (and some as-yet unknown) vulnerabilities.
Our rule-intensive WAF provides excellent protection, but it does have potential drawbacks. The more rules are included, the more resources Imunify can consume, and the slower the server can get. Also, including more rules can increase the number of false positives, or erroneously identified “threats.” How could the WAF include enough rules to provide great protection, without slowing down the server or generating more false positives? That’s the challenge the Imunify development team set out to meet, and they did it with Imunify’s new WAF Rules Auto-Configurator.
The WAF Rules Auto-Configurator configures rules for particular sites, based on the CMSes they run. For instance, if a site is running WordPress, then Imunify applies a set of rules optimized to protect WordPress sites. Rules for Joomla, or Drupal, or any other CMS aren’t used. By the same token, if a site runs Drupal, then Drupal-specific rules are applied.
Let’s examine the benefits of Imunify’s new WAF Rules Auto-Configurator in detail:
To enable the WAF Rules Auto-Configurator, follow these instructions:
To enable it from the CLI, just run this command:
imunify360-agent config update '{"MOD_SEC": {"app_specific_ruleset": true}}'
It can take some time to scan all software on the server and reconfigure ModSecurity rules in an optimal way. To speed up the process, run this command:
/opt/alt/python35/share/imunify360/scripts/update_components_versions.py --update-modsec-rulesets
The Imunify product team would like to hear from you. To share your ideas and observations on Imunify’s web server protection system, please send them to us at feedback@cloudlinux.com.
If you have questions on how to use Imunify360, or you’d like to resolve a support issue, please contact the Imunify360 support team at cloudlinux.zendesk.com.