Fortinet 5.0 Patch 6 Microscope & Magnifier User Manual


 
FortinetFortinet 5 FortiWeb 5.0 Patch 6 Administration Guide
Auto-learning ....................................................................................................... 151
How to adapt auto-learning to dynamic URLs & unusual parameters .......... 151
Configuring URL interpreters ................................................................... 152
Example: URL interpreter for a JSP application ................................ 156
Example: URL interpreter for Microsoft Outlook Web App 2007....... 156
Example: URL interpreter for WordPress........................................... 160
Grouping URL interpreters....................................................................... 165
Recognizing data types ................................................................................. 166
Predefined data types.............................................................................. 166
Grouping predefined data types.............................................................. 170
Recognizing suspicious requests .................................................................. 171
Predefined suspicious request URLs....................................................... 172
Configuring custom suspicious request URLs ........................................ 173
Grouping custom suspicious request URLs ............................................ 174
Grouping all suspicious request URLs..................................................... 175
Configuring an auto-learning profile .............................................................. 177
Running auto-learning.................................................................................... 180
Pausing auto-learning for a URL.................................................................... 181
Viewing auto-learning reports........................................................................ 182
Using the report navigation pane............................................................. 183
Using the report display pane.................................................................. 186
Overview tab ...................................................................................... 186
Attacks tab......................................................................................... 188
About the attack count....................................................................... 191
Visits tab............................................................................................. 191
Parameters tab................................................................................... 194
Cookies tab........................................................................................ 195
Generating a profile from auto-learning data................................................. 196
Transitioning out of the auto-learning phase................................................. 199
Removing old auto-learning data................................................................... 200
Testing your installation....................................................................................... 201
Reducing false positives................................................................................ 202
Testing for vulnerabilities & exposure............................................................ 203
Expanding the initial configuration................................................................. 203
Switching out of offline protection mode............................................................. 205
Backups......................................................................................................... 206
Restoring a previous configuration...................................................................... 210
Administrators .............................................................................................. 212
Configuring access profiles ................................................................................. 216
Grouping remote authentication queries for administrators................................ 218
Changing an administrator’s password............................................................... 219