Overview: Evasion Techniques

Evasion techniques refer to techniques usually used by hackers to attempt to access resources or evade what would otherwise be identified as an attack. Like HTTP compliance, evasion techniques have a list of sub-violations that can be configured for additional granularity and to reduce false positives.

Evasion technique violations management on BIG-IP Next Central Manager

Evasion technique violations management in BIG-IP Next Central Manager’s Policy Editor