ModSecurity Handbook: Getting Started - Bad Request
ModSecurity Handbook: Getting Started - Bad Request
ModSecurity Handbook: Getting Started - Bad Request
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
iv<br />
Installation from Source 24<br />
Downloading Releases 24<br />
Downloading from Repository 25<br />
Installation on Unix 27<br />
Installation from Binaries 30<br />
Fedora Core, CentOS, and Red Hat Enterprise Linux 30<br />
Debian and Ubuntu 31<br />
Installation on Windows 31<br />
Summary 32<br />
3. Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br />
Folder Locations 34<br />
Configuration Layout 36<br />
Adding <strong>ModSecurity</strong> to Apache 37<br />
Powering Up 37<br />
<strong>Request</strong> Body Handling 38<br />
Response Body Handling 40<br />
Filesystem Locations 42<br />
File Uploads 42<br />
Debug Log 43<br />
Audit Log 44<br />
Miscellaneous Options 44<br />
Default Rule Match Policy 45<br />
Handling Processing Errors 45<br />
Verifying Installation 47<br />
Summary 48<br />
4. Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49<br />
Debug Log 49<br />
Debugging in Production 50<br />
Audit Log 52<br />
Audit Log Entry Example 53<br />
Concurrent Audit Log 55<br />
Remote Logging 56<br />
Configuring Remote Logging 57<br />
Activating Remote Logging 59<br />
Troubleshooting Remote Logging 60<br />
File Upload Interception 62<br />
Storing Files 62<br />
Inspecting Files 63<br />
Integrating with ClamAV 64