security anti-fraud profile(1)BIG-IP TMSH Manualsecurity anti-fraud profile(1)
NAME
profile - Configures a Fraud Protection Service profile.
MODULE
security anti-fraud
SYNTAX
Configure the profile component within the security anti-fraud module
using the syntax shown in the following sections.
CREATE/MODIFY
create profile [name]
modify profile [name]
options:
alert-client-side-caching [enabled | disabled]
alert-identifier [string]
alert-path [string]
alert-pool [[name] | none]
alert-publisher [[name] | none]
alert-token-header [string]
app-layer-encryption {
fail-open [enabled | disabled]
}
app-service [[string] | none]
auto-transactions {
bot-score [integer]
click-score [integer]
integrity-fail-score [integer]
min-mouse-move-count [integer]
min-mouse-over-count [integer]
min-report-score [integer]
min-time-to-request [integer]
not-human-score [integer]
strong-integrity {
hide-encrypted-parameters [enabled | disabled]
parameter [string]
}
tampered-cookie-score [integer]
time-fail-score [integer]
}
before-load-function [[string] | none]
blocking-page {
response-body [[string] | none]
response-headers [string]
}
[case-sensitive | case-insensitive]
cloud-service-pool [[name] | none]
config-location [string]
cookies {
application [none | add | delete | replace-all-with] { [string] ... }
base-domain {
apply [enabled | disabled]
exceptions [none | add | delete | replace-all-with] { [string] ... }
}
client-side [string]
client-side-lifetime [[integer] | session]
components-state [string]
components-state-lifetime [[integer] | session]
components-state-removal-protection [enabled | disabled]
encryption-disabled [string]
encryption-disabled-lifetime [[integer] | session]
encryption-disabled-removal-protection [enabled | disabled]
fingerprint [string]
fingerprint-lifetime [[integer] | session]
fingerprint-removal-protection [enabled | disabled]
html-field-obfuscation [string]
html-field-obfuscation-lifetime [[integer] | session]
malware-forensic [string]
malware-forensic-lifetime [[integer] | session]
malware-guid [string]
malware-guid-lifetime [[integer] | session]
malware-guid-removal-protection [enabled | disabled]
rules [string]
rules-lifetime [[integer] | session]
rules-removal-protection [enabled | disabled]
secure-alert [string]
secure-alert-lifetime [[integer] | session]
secure-alert-removal-protection [enabled | disabled]
secure-channel [string]
secure-channel-lifetime [[integer] | session]
secure-channel-removal-protection [enabled | disabled]
transaction-data [string]
transaction-data-lifetime [[integer] | session]
user-inspection [string]
user-name [string]
user-name-lifetime [[integer] | session]
user-name-removal-protection [enabled | disabled]
}
debug {
console-log {
client-ips [none | add | delete | replace-all-with] { [string] ... }
user-agents [none | add | delete | replace-all-with] { [string] ... }
fingerprints [none | add | delete | replace-all-with] { [string] ... }
}
send-alert {
client-ips [none | add | delete | replace-all-with] { [string] ... }
user-agents [none | add | delete | replace-all-with] { [string] ... }
fingerprints [none | add | delete | replace-all-with] { [string] ... }
}
}
defaults-from [[name] | none]
description [[string] | none]
dummy-alert-html-maximum-length [integer]
encryption-staging-mode [enabled | disabled]
fingerprint {
collect [enabled | disabled]
location [string]
}
forensic {
alert-path [string]
client-domains [none | add | delete | replace-all-with] { [string] ... }
cloud-config-path [string]
cloud-forensics-mode [integer]
cloud-remediation-mode [integer]
continue-element [[string] | none]
exe-location [string]
html [[string] | none]
self-post-location [string]
skip-element [[string] | none]
skip-path [string]
}
geolocation [enabled | disabled]
inject-main-javascript {
[after | before]
tag [string]
}
javascript-grace-threshold [integer]
javascript-location [string]
javascript-removal-location [string]
local-syslog-publisher [[name] | none]
malware {
allowed-domains [none | add | delete | replace-all-with] { [string] ... }
bait-check-generic [enabled | disabled]
bait-location [string]
blacklist-words [none | add | delete | replace-all-with] { [string] ... }
detected-malware [none | add | delete | modify | replace-all-with] {
name [string] {
baits [none | add | delete | modify | replace-all-with] {
name [string] {
data-before [string]
data-inject [string]
trigger-url {
name [string]
position [ alone | any | last ]
}
}
}
blacklist-functions [none | add | delete | replace-all-with] { [string] ... }
blacklist-js-words [none | add | delete | replace-all-with] { [string] ... }
blacklist-urls [none | add | delete | replace-all-with] { [string] ... }
blacklist-words [none | add | delete | replace-all-with] { [string] ... }
browser-cache {
blacklist-urls [none | add | delete | modify | replace-all-with] { [string] ... }
whitelist-urls [none | add | delete | modify | replace-all-with] { [string] ... }
}
domain-availability {
blacklist-urls [none | add | delete | modify | replace-all-with] { [string] ... }
whitelist-urls [none | add | delete | modify | replace-all-with] { [string] ... }
}
dom-signatures [none | add | delete | modify | replace-all-with] {
name [string] {
attribute-name [[string] | none]
hash-id [string]
html-tag [[string] | none]
match-type [ contains | is ]
search-for [string]
search-in [ all | attribute | html | js-global-variable | text ]
}
}
generic-whitelist-words [none | add | delete | replace-all-with] { [string] ... }
}
}
domain-availability-urls [[string] | none]
external-sources-targets [none | add | delete | replace-all-with] { [string] ... }
flash-cookie-content [[string] | none]
flash-cookie-location [string]
flash-cookies [enabled | disabled]
generic-whitelist-words [none | add | delete | replace-all-with] { [string] ... }
inline-scripts-whitelist-signatures [none | add | delete | replace-all-with] { [string] ... }
removed-scripts {
blacklist-functions [none | add | delete | replace-all-with] { [string] ... }
whitelist-functions [none | add | delete | replace-all-with] { [string] ... }
}
same-domain-scripts-validation-header [string]
self-bait-header [string]
source-integrity-location [string]
web-rootkit {
blacklist-functions [none | add | delete | replace-all-with] { [string] ... }
whitelist-functions [none | add | delete | replace-all-with] { [string] ... }
}
}
mobilesafe {
alert-custom-config [[string] | none]
alert-threshold [integer]
app-integrity {
custom-config [[string] | none]
[enabled | disabled]
android {
score [integer]
signature [[string] | none]
}
ios {
hashes [none | add | delete | modify | replace-all-with] {
value [string] {
version [[string] | none]
}
}
score [integer]
}
}
general-custom-config [[string] | none]
malware {
android {
custom-malware [none | add | delete | modify | replace-all-with] {
name [string] {
package [string]
score [integer]
}
}
custom-whitelist [none | add | delete | modify | replace-all-with] {
name [string] {
package [string]
}
}
}
check-custom [enabled | disabled]
check-generic [enabled | disabled]
custom-config [[string] | none]
[enabled | disabled]
ios {
custom-malware [none | add | delete | modify | replace-all-with] {
name [string] {
path [string]
score [integer]
}
}
custom-whitelist [none | add | delete | modify | replace-all-with] {
name [string] {
path [string]
}
}
}
behaviour-analysis {
run [enabled | disabled]
score [integer]
}
}
mitm {
certificate-custom-config [[string] | none]
dns-custom-config [[string] | none]
domains [none | add | delete | modify | replace-all-with] {
name [string] {
dns {
ip-ranges [none | add | delete | replace-all-with] {address | address-address ... }
spoofing-score [integer]
}
certificate {
forging-score [integer]
hash [string]
}
}
}
[enabled | disabled]
}
os-security {
android {
untrusted-apps-score [integer]
versions [none | add | delete | modify | replace-all-with] {
priority [integer] {
from [string]
score [integer]
to [string]
}
}
}
custom-config [[string] | none]
[enabled | disabled]
ios {
versions [none | add | delete | modify | replace-all-with] {
priority [integer] {
from [string]
score [integer]
to [string]
}
}
}
}
rooting-jailbreak {
custom-config [[string] | none]
[enabled | disabled]
jailbreak-score [integer]
rooting-score [integer]
}
}
phishing {
alert-path [string]
allowed-elements [none | add | delete | replace-all-with] { [string] ...}
allowed-referrers [none | add | delete | replace-all-with] { [string] ...}
application-css [enabled | disabled]
application-css-locations [none | add | delete | replace-all-with] { [string] ...}
css-attribute-name [string]
css-location [string]
expiration-checks [enabled | disabled]
image-location [string]
inject-css-element {
[after | before]
tag [string]
}
inject-css-link {
[after | before]
tag [string]
}
inject-inline-javascript {
[after | before]
tag [string]
}
protected-elements [none | add | delete | replace-all-with] { [string] ...}
referrer-checks [enabled | disabled]
}
referrer-info-header [string]
risk-engine-path [string]
risk-engine-publisher [[name] | none]
rules [none | add | delete | modify | replace-all-with] {
event [auto-transaction | client-network-connection | client-side-missing-components | encryption-failure |
generic-malware | mandatory-words | phishing | phishing-user | rat-detection | referrer-checks |
server-side-missing-components | source-integrity | web-injection] {
action [block-user | forensic | inspection | redirect | remediation | route | web-service]
duration [integer]
enforce-policy [enforce | time-limited | unlimited]
min-score [integer]
publisher [[name] | none]
payload [[string] | none]
pool [[name] | none]
url [[string] | none]
}
}
suggested-username-header [string]
trigger-irule [enabled | disabled]
urls [none | add | delete | modify | replace-all-with] {
name [string] {
app-layer-encryption {
add-decoy-inputs [enabled | disabled]
auto-complete-block [enabled | disabled]
auto-complete-whitelist-functions [none | add | delete | replace-all-with] { [string] ...}
custom-encryption-function [[string] | none]
[enabled | disabled]
fake-strokes [enabled | disabled]
full-ajax-encryption [enabled | disabled]
hide-password-revealer [enabled | disabled]
html-field-obfuscation [enabled | disabled]
real-time-encryption [enabled | disabled]
remove-element-ids [enabled | disabled]
remove-event-listeners [enabled | disabled]
stolen-creds [enabled | disabled]
substitute-value-function [[string] | none]
}
auto-transactions {
attach-ajax-payload-to-alerts [enabled | disabled]
bot-score [integer]
browser [enabled | disabled]
click-score [integer]
[enabled | disabled]
full-ajax-integrity [enabled | disabled]
integrity-fail-score [integer]
min-mouse-move-count [integer]
min-mouse-over-count [integer]
min-report-score [integer]
min-time-to-request [integer]
non-browser [enabled | disabled]
not-human-score [integer]
strong-integrity [enabled | disabled]
strong-integrity-user-functions [none | add | delete | replace-all-with] { [string] ...}
submit-buttons [none | add | delete | replace-all-with] { [string] ...}
tampered-cookie-score [integer]
time-fail-score [integer]
}
before-load-function [[string] | none]
custom-alerts [none | add | delete | modify | replace-all-with] {
name [string] {
attach-request-part [enabled | disabled]
component [auto-transactions | malware | mobilesafe | phishing]
header-name [[string] | none]
malware-name [[string] | none]
message [[string] | none]
search-in [client-ip | header | payload | query-string]
value [[string] | none]
}
}
description [string]
destination-urls [none | add | delete | replace-all-with] { [string] ...}
fallback-to-base-url [enabled | disabled]
include-query-string [enabled | disabled]
inject-javascript [enabled | disabled]
inject-javascript-removal {
[after | before]
tag [string]
}
inject-main-javascript {
[after | before]
tag [string]
}
login-response {
status-code [[integer] | none]
domain-cookie [[string] | none]
exclude-string [[string] | none]
header [[string] | none]
include-string [[string] | none]
validation [enabled | disabled]
}
malware {
attach-html-to-alerts [enabled | disabled]
auto-learn-form-tags [enabled | disabled]
auto-learn-input-tags [enabled | disabled]
auto-learn-script-tags [enabled | disabled]
blocked-enter-key-detection [enabled | disabled]
deferred-execution [enabled | disabled]
domain-availability [enabled | disabled]
enable-symbols [enabled | disabled]
[enabled | disabled]
external-injection [enabled | disabled]
generic-malware [enabled | disabled]
manual-count-form-tags [integer]
manual-count-input-tags [integer]
manual-count-script-tags [integer]
rat-detection [enabled | disabled]
removed-scripts-detection [enabled | disabled]
same-domain-scripts-validation [enabled | disabled]
self-bait [enabled | disabled]
source-integrity [enabled | disabled]
vbklip-detection [enabled | disabled]
visibility-check [enabled | disabled]
visibility-check-items [none | add | delete | replace-all-with] { [string] ...}
web-rootkit-detection [enabled | disabled]
whitelist-dom-signatures [none | add | delete | replace-all-with] { [string] ...}
whitelist-words [none | add | delete | replace-all-with] { [string] ...}
}
mobilesafe-encryption [enabled | disabled]
parameters [none | add | delete | modify | replace-all-with] {
name [string] {
ajax-mapping [string]
attach-to-vtoken-report [enabled | disabled]
check-integrity [enabled | disabled]
encrypt [enabled | disabled]
identify-as-username [enabled | disabled]
method [GET | POST]
mobilesafe-encrypt [enabled | disabled]
mobilesafe-entangle [enabled | disabled]
obfuscate [enabled | disabled]
priority [integer]
search-in [payload | query-string | any]
substitute-value [enabled | disabled]
type [explicit | wildcard]
}
}
phishing {
capture-users [enabled | disabled]
copy-detection [enabled | disabled]
css-protection [enabled | disabled]
[enabled | disabled]
field-types-to-send [none | add | delete | replace-all-with] { [string] ...}
inject-css-element {
[after | before]
tag [string]
}
inject-css-link {
[after | before]
tag [string]
}
inject-inline-javascript {
[after | before]
tag [string]
}
}
priority [integer]
type [explicit | wildcard]
}
}
users [add | delete | modify] {
name [string] {
modes [add | delete] {
mode [block | forensic | inspection | remediation] {
duration [integer]
enforce-policy [enforce | time-limited | unlimited]
first-login-time [date]
}
}
}
}
whitelist-custom-alerts [none | add | delete | replace-all-with] { [string] ...}
edit profile [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
DISPLAY
list profile
list profile [ [ [name] | [glob] | [regex] ] ... ]
show running-config profile
show running-config profile [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
one-line
partition
recursive
DELETE
delete profile [name]
DESCRIPTION
You can use the profile component to create, modify, display, or delete
an Anti-Fraud profile.
Note: The users property may be specified only for the commands modify,
edit, and list and only when no other properties are specified. By
default, users are not displayed.
Note: The first-login-time property of user modes may be specified only
for the list command.
EXAMPLES
create profile my_antifraud_profile
Creates a custom Anti-Fraud profile named my_antifraud_profile with
default parameters.
list profile
Displays the properties of all Anti-Fraud profiles.
OPTIONS
alert-client-side-caching
Specifies whether or not to cache the sent alerts in order to
prevent multiple alerts from being sent to the dashboard.
alert-identifier
Specifies the ID of the customer in the dashboard.
alert-path
Specifies the BIG-IP URL path where the alert is sent. This path
cannot be none and must start with '/'.
alert-pool
Specifies the name of the pool used when the system sends alerts.
alert-publisher
Specifies the name of the log publisher used for sending alerts
originating from the BIG-IP. If only DPS is licensed, this
publisher is used for reporting encryption failures.
alert-token-header
Specifies the name of the custom HTTP header in alerts for
exchanging a random token between the client side and the BIG-IP.
app-layer-encryption
Specifies how the system performs Application layer encryption.
With Application layer encryption, the system detects an attempt
to steal and tamper with end-user passwords (or other protected
information), and also prevents it by encrypting the protected
information. You can configure the following options for
Application layer encryption:
fail-open
Specifies, when enabled, that upon encryption error the
system disables encryption in consecutive requests in the
current session.
app-service
Specifies the name of the application service to which the profile
belongs. The default value is none. Note: If the strict-updates
option is enabled on the application service that owns the object,
you cannot modify or delete the profile. Only the application
service can modify or delete the profile.
auto-transactions
Specifies how the system differentiates between human and
automatic (bot) transactions. You can configure the following
options for automatic transactions:
bot-score
Deprecated since v13.0.0. Please use bot-score in auto-
transactions under urls instead. Specifies the score added to
an alert that is triggered if the system determines that the
client is a bot and not a human. The default is a score of
50.
click-score
Deprecated since v13.0.0. Please use click-score in auto-
transactions under urls instead. Specifies the score added to
an alert that is triggered if the min-mouse-over-count and
min-mouse-move-count conditions are not met. The default is a
score of 40.
integrity-fail-score
Deprecated since v13.0.0. Please use integrity-fail-score in
auto-transactions under urls instead. Specifies the score
added to an alert that is triggered if the system detects a
difference between the actual parameter value and the
expected value of a protected parameter sent after a user
clicks a web form's Submit button. The default is a score of
40.
min-mouse-move-count
Deprecated since v13.0.0. Please use min-mouse-move-count in
auto-transactions under urls instead. Specifies the minimum
number of mouse movements necessary per page load in order
for the system to consider the transaction to be of human
origin. The default is 5 movements.
min-mouse-over-count
Deprecated since v13.0.0. Please use min-mouse-over-count in
auto-transactions under urls instead. Specifies the minimum
number of times the client's mouse is positioned over the
Submit button in a web form in order for the system to
consider the transaction to be of human origin. The default
is 2 button interactions.
min-report-score
Deprecated since v13.0.0. Please use min-report-score in
auto-transactions under urls instead. Specifies the lowest
score necessary for the system to send an alert. The default
value is 50.
min-time-to-request
Deprecated since v13.0.0. Please use min-time-to-request in
auto-transactions under urls instead. Specifies the minimum
amount of time (in seconds) permitted between when a web form
is opened and the Submit button is clicked. The default is 2
seconds.
not-human-score
Deprecated since v13.0.0. Please use not-human-score in auto-
transactions under urls instead. Specifies the score added to
an alert that is triggered if the system only suspects that
the client is a bot and not a human. The default is a score
of 25.
strong-integrity
Specifies how the system performs strong integrity. You can
configure the following options for strong integrity:
hide-encrypted-parameters
Deprecated since v14.1.0. Please use attach-to-vtoken-
report under parameters instead. Specifies, when
enabled, that JavaScript does not add the expected value
of encrypted parameters to strong integrity parameter.
parameter
Deprecated since v14.1.0. Specifies the name of the HTTP
parameter in POST requests added by JavaScript with the
expected user-input data verified with physical input
events.
tampered-cookie-score
Deprecated since v13.0.0. Please use tampered-cookie-score in
auto-transactions under urls instead. Specifies the score
added to an alert that is triggered if the system detects
that the transaction-data cookie was tampered with. The
default is a score of 50.
time-fail-score
Deprecated since v13.0.0. Please use time-fail-score in auto-
transactions under urls instead. Specifies the score added to
an alert that is triggered if the min-time-to-request
condition is not met. The default is a score of 20.
before-load-function
Specifies the implementation of additional function to be run
before JavaScript load, in the following format:
function(configs){...}. Note: For certain advanced configurations,
F5 support may provide relevant code to be entered here, please do
not use it on your own.
blocking-page
Specifies information to display when the profile blocks a user
account. You can configure the following options for blocking
page:
response-body
Specifies the HTML code the system sends to the user whose
account is blocked.
response-headers
Specifies the set of response headers that the system sends
to the user whose account is blocked. Separate each header
with a new line (Ctrl-V followed by Ctrl-J).
[case-sensitive | case-insensitive]
Specifies whether the profile treats protected URL paths as case
sensitive, or not. The default value is case-insensitive. Note: If
you create a profile, you can use either property, thereafter it
becomes read only. If the profile is case insensitive, the system
stores protected URL paths in lowercase in the profile
configuration.
cloud-service-pool
Specifies the name of the pool used by the system for various
internal purposes, like signing Forensics tool.
config-location
Specifies the BIG-IP URL directory where the configuration for the
injected JavaScript is located. The path here does not include the
actual filename of the configuration for the injected JavaScript.
This path cannot be none and must start with '/'.
cookies
Specifies names and lifetimes for the cookies that the system uses
to optimize its detection of malware, data transactions, and
phishing attacks on the web application. If you do not assign a
name to a cookie, a random name is assigned. You can configure the
following cookies:
application
Adds, deletes, or replaces a set of application cookies that
will be removed if at least one of the protected cookies is
missing.
base-domain
Specifies base domain settings for the cookies. You can
configure the following options for base domain:
apply
Specifies, when enabled, that the system applies the
cookies to the base domain.
exceptions
Adds, deletes, or replaces a set of exceptional base
domains that take precedence when the system resolves
the base domain from a host header.
client-side
Specifies the name of the cookie in which the system inserts
plain text with a record about client side alerts already
sent. This is done in order to prevent flooding the system
with additional alerts if the page reloads.
client-side-lifetime
Specifies whether the client-side cookie is persistent, and
if so, after how many minutes it expires.
components-state
Specifies the name of the cookie that verifies that the
system's expected JavaScript can run successfully, and
whether the system successfully decrypted configuration data
arriving from server.
components-state-lifetime
Specifies whether the components-state cookie is persistent,
and if so, after how many minutes it expires.
components-state-removal-protection
Enables or disables removal detection for the secure-alert
cookie.
encryption-disabled
Specifies the name of the cookie that the system adds if the
system fails to decrypt a password (to restore the original
password as the user typed it), and the system forwards a
request to the server and waits for a login failure response.
In this case, the cookie does not encrypt the password on the
next login attempt. This is used in situations where
Application layer encryption is not possible (for example, if
the user is using an old browser that cannot encrypt
passwords).
encryption-disabled-lifetime
Specifies whether the encryption-disabled cookie is
persistent, and if so, after how many minutes it expires.
encryption-disabled-removal-protection
Enables or disables removal detection for the encryption-
disabled cookie.
fingerprint
Specifies the name of the cookie that contains fingerprint
data.
fingerprint-lifetime
Specifies whether the fingerprint cookie is persistent, and
if so, after how many minutes it expires.
fingerprint-removal-protection
Enables or disables removal detection for the fingerprint
cookie.
html-field-obfuscation
Specifies the name of the cookie that the system sets to
identify the fields that were created by HTML field
obfuscation, in order to remove them from the request before
sending it back to the web application, and to know which
field names to decrypt.
html-field-obfuscation-lifetime
Specifies whether the html-field-obfuscation cookie is
persistent, and if so, after how many minutes it expires.
malware-forensic
Specifies the name of the cookie that stores the essential
response header values from the web application to be sent to
the user after he finishes or skips downloading and running
Forensics tool on his host.
malware-forensic-lifetime
Specifies whether the malware-forensic cookie is persistent,
and if so, after how many minutes it expires.
malware-guid
Specifies the name of the cookie set by JavaScript to a
random string (12 chars long, not encrypted). The system
sends this cookie value in a special alert to the dashboard
in order to associate it with the logged in user.
malware-guid-lifetime
Specifies whether the malware-guid cookie is persistent, and
if so, after how many minutes it expires.
malware-guid-removal-protection
Enables or disables removal detection for the malware-guid
cookie.
rules
Specifies the name of the cookie that the system sets in
order to perform the actions block-user, forensic,
inspection, remediation, or redirect.
rules-lifetime
Specifies whether the rules cookie is persistent, and if so,
after how many minutes it expires.
rules-removal-protection
Enables or disables removal detection for the rules cookie.
secure-alert
Specifies the name of the cookie that secures arrival of
alerts originating from JavaScript to the dashboard.
secure-alert-lifetime
Specifies whether the secure-alert cookie is persistent, and
if so, after how many minutes it expires.
secure-alert-removal-protection
Enables or disables removal detection for the secure-alert
cookie.
secure-channel
Specifies the name of the cookie that the system sets when
the system provides JavaScript with a public key for
encryption operations. This cookie is used for the system to
correlate incoming encrypted data with the private key when a
request comes from the client.
secure-channel-lifetime
Specifies whether the secure-channel cookie is persistent,
and if so, after how many minutes it expires.
secure-channel-removal-protection
Enables or disables removal detection for the secure-channel
cookie.
transaction-data
Specifies the name of the cookie that contains information
(such as mouse movement, clicks, and events) in encrypted
format and sends that information to the system.
transaction-data-lifetime
Specifies whether the transaction-data cookie is persistent,
and if so, after how many minutes it expires.
user-inspection
Specifies the name of cookie that is set once a user is
identified in a web form submitted by the client and this
user is enforced in inspection mode.
user-name
Specifies the name of the cookie with the username value
after a username is identified in a request. This ensures
that further transactions from the client are still
associated with that user even if they do not include the
username field.
user-name-lifetime
Specifies whether the user-name cookie is persistent, and if
so, after how many minutes it expires.
user-name-removal-protection
Enables or disables removal detection for the user-name
cookie.
debug
Specifies troubleshooting settings to add and filter debug logs of
the system. Note: Only F5 support should configure this section,
please do not use it on your own. F5 support can configure the
following debug options:
console-log
Specifies when the system add prints to browser console. TMM
logs are also enabled in such cases. F5 support can configure
the following options for console log:
client-ips
Adds, deletes, or replaces a set of client IP addresses
for which the system adds prints to browser console.
user-agents
Adds, deletes, or replaces a set of strings contained in
user-agent header for which the system adds prints to
browser console.
fingerprints
Adds, deletes, or replaces a set of strings contained in
fingerprint data for which the system adds prints to
browser console.
send-alert
Specifies when the system sends debug alerts to the
dashboard. TMM logs are also enabled in such cases. F5
support can configure the following options for sending
alerts:
client-ips
Adds, deletes, or replaces a set of client IP addresses
for which the system sends debug alerts to the
dashboard.
user-agents
Adds, deletes, or replaces a set of strings contained in
user-agent header for which the system sends debug
alerts to the dashboard.
fingerprints
Adds, deletes, or replaces a set of strings contained in
fingerprint data for which the system sends debug alerts
to the dashboard.
defaults-from
Specifies the profile that you want to use as the parent profile.
Your new profile inherits all settings and values from the parent
profile specified.
description
User defined description.
dummy-alert-html-maximum-length
Specifies the maximum length of HTML attached to dummy alert.
encryption-staging-mode
Specifies, when enabled, that the system activates Anti-fraud
encryption staging mode. If decrypted data differs from original
data, an alert will be sent and original data will be used.
fingerprint
Specifies how the system collects fingerprint data. You can
configure the following fingerprint options:
collect
Specifies, when enabled, that the system collects fingerprint
data.
location
Specifies the BIG-IP URL location of the fingerprint
JavaScript. This path cannot be none and must start with '/'.
forensic
Specifies how the system enforces scanning client host for malware
(Forensics) and its removal (remediation). You can configure the
following options for Forensics and remediation:
alert-path
Specifies the BIG-IP URL path for alerts from Forensics tool.
This path cannot be none and must start with '/'.
client-domains
Adds, deletes, or replaces a set of client domains to be
resolved by Forensics tool.
cloud-config-path
Specifies the BIG-IP URL path for requests from Forensics
tool to cloud-service-pool. This path cannot be none and must
start with '/'.
cloud-forensics-mode
Specifies the numeric value sent to cloud-service-pool to
download Forensics tool.
cloud-remediation-mode
Specifies the numeric value sent to cloud-service-pool to
download Forensics tool in remediation mode.
continue-element
Specifies the HTML element with continue option that replaces
%SKIP_PART% in the entire html, when enforce-policy is
enforce. Note: This property may be modified only when the DB
variable antifraud.forensic.showgui has value enable.
exe-location
Specifies the BIG-IP URL path to download Forensics tool that
also replaces %EXE_LOCATION% in the entire html. This path
cannot be none and must start with '/'.
html Specifies the HTML code the system sends to the user after
successful login with option to download Forensics tool.
Note: This property may be modified only when the DB variable
antifraud.forensic.showgui has value enable.
self-post-location
Specifies the BIG-IP URL path for self POST page opened by
Forensics tool during scanning. This path cannot be none and
must start with '/'.
skip-element
Specifies the HTML element with skip option that replaces
%SKIP_PART% in the entire html, when enforce-policy is not
enforce. Note: This property may be modified only when the DB
variable antifraud.forensic.showgui has value enable.
skip-path
Specifies the BIG-IP URL path for skip / continue option that
also replaces %SKIP_PATH% in both continue-element and skip-
element (before their replacement in the entire html). This
path cannot be none and must start with '/'.
geolocation
Specifies, when enabled, that the client collects geolocation data
which will be sent as part of the alert data.
glob Displays the items that match the glob expression. See help glob
for a description of glob expression syntax.
inject-main-javascript
Deprecated since v12.1.3 (excluding v13.0.0). Please use same
configuration in a specific URL instead. Specifies where the
system injects the main JavaScript. You can configure the
following options for main JavaScript injection position:
[after | before]
Deprecated since v12.1.3 (excluding v13.0.0). Please use same
configuration in a specific URL instead. Specifies whether
the system injects the main JavaScript after an opening tag
or before a closing tag.
tag Deprecated since v12.1.3 (excluding v13.0.0). Please use same
configuration in a specific URL instead. Specifies the HTML
tag for injection of the main JavaScript. This tag cannot be
none.
javascript-grace-threshold
Specifies the maximum amount of time (in seconds) permitted
between when a protected web page is loaded and its injected
JavaScript activates.
javascript-location
Specifies the BIG-IP URL directory where the injected JavaScript
is located. The path here does not include the actual filename of
the injected JavaScript. This path cannot be none and must start
with '/'.
javascript-removal-location
Specifies the BIG-IP URL location of the JavaScript removal
detection location. This path cannot be none and must start with
'/'.
local-syslog-publisher
DPS mode only. Specifies the name of the log publisher used for
reporting encryption failures.
malware
Specifies how the system detects a malware attack on the web
application. You can configure the following options for Malware
protection:
allowed-domains
Adds, deletes, or replaces a set of whitelisted domains. The
system does not send alerts on requests for URLs from these
domains, even if the system detects malware injection on
these domains.
bait-check-generic
Specifies, when enabled, that the system checks predefined
baits. Note: The configured baits are checked anyway.
bait-location
Specifies the BIG-IP URL location of a file that acts as bait
for attackers. This path cannot be none and must start with
'/'.
blacklist-words
Deprecated since v13.0.0. Please use blacklist-js-words and
blacklist-words in detected-malware instead. Adds, deletes,
or replaces a set of words that are blacklisted if they
appear in the web application's HTML or JavaScript code. If
the system detects these words, the system generates a
malware alert.
detected-malware
Adds, deletes, or replaces a set of malware detected by the
system. You can configure the following options for each
malware:
baits
Adds, deletes, or replaces a set of baits for this
malware. You can configure the following options for
each bait:
data-before
Specifies the HTML code that the malware searches
and injects data-inject after it.
data-inject
Specifies the malicious code that the malware
injects after data-before.
trigger-url
Specifies trigger URL settings for this bait. You
can configure the following options for trigger
URL:
name Specifies the URL pattern that triggers the
malware to inject malicious code.
position
Specifies the position of this URL pattern in
the query string of a bait request.
alone
Specifies that this trigger URL must be
alone in the query string of a bait
request.
any Specifies that the this trigger URL can
be anywhere in the query string of a bait
request. This is the default value.
last Specifies that the this trigger URL must
be last in the query string of a bait
request.
blacklist-functions
Adds, deletes, or replaces a set of regular expression
patterns to detect functions that this malware can use
when executing AJAX requests.
blacklist-js-words
Adds, deletes, or replaces a set of words that are
blacklisted if they appear in the JavaScript code. If
the system detects these words, the system generates a
malware alert.
blacklist-urls
Adds, deletes, or replaces a set of regular expression
patterns to detect URLs that this malware can use for
AJAX requests and external scripts.
blacklist-words
Adds, deletes, or replaces a set of words that are
blacklisted if they appear in the web application's HTML
code. If the system detects these words, the system
generates a malware alert.
browser-cache
Specifies how the system checks client network
connection as targeted method. You can configure the
following options for Browser cache:
blacklist-urls
Adds, deletes, or replaces a set of resources that
are loaded by the malware.
whitelist-urls
Adds, deletes, or replaces a set of non-existent
resources.
domain-availability
Specifies how the system checks client network
connection as generic method. You can configure the
following options for Domain availability:
blacklist-urls
Adds, deletes, or replaces a set of URLs that are
not blocked by the malware.
whitelist-urls
Adds, deletes, or replaces a set of URLs that are
blocked by the malware.
dom-signatures
Adds, deletes, or replaces a set of DOM signatures for
this malware. You can configure the following options
for each DOM signature:
attribute-name
Specifies the name of the attribute in which the
pattern should be search for. Used only if search-
in is attribute.
hash-id
Specifies unique ID that identifies this DOM
signature in profile.
html-tag
Specifies the name of the HTML tag in which the
pattern should be search for.
match-type
Specifies the type of DOM signature pattern
matching.
contains
Specifies that this DOM signature pattern
should be matched as partial match (not
applicable when search-in is js-global-
variable).
is Specifies that this DOM signature pattern
should be matched as exact match.
search-for
Specifies the DOM signature pattern to search for.
search-in
Specifies search location for DOM signature.
all Specifies that this DOM signature should be
searched in all locations.
attribute
Specifies that this DOM signature pattern
should be searched only in an attribute with
name attribute-name.
html Specifies that this DOM signature pattern
should be searched only in HTML.
js-global-variable
Specifies that this DOM signature pattern
should be searched only in JavaScript global
variables (match-type contains not applicable
in such case).
text Specifies that this DOM signature pattern
should be searched only in text.
generic-whitelist-words
Deprecated since v15.0.0. Please use whitelist-dom-
signatures in urls instead. Adds, deletes, or replaces a
set of generic blacklisted words that are ignored.
domain-availability-urls
Deprecated since v13.0.0. Please use blacklist-urls and
whitelist-urls in domain-availability under detected-malware
instead. Specifies a JSON object containing URLs for which
client network connectivity should be checked.
external-sources-targets
Adds, deletes, or replaces a set of HTML element types and
their attributes for which external injections should be
checked.
flash-cookie-content
Specifies the flash file (in hexadecimal format) used to
allow JavaScript to access the Flash object on the client
side. The default content is none. The length is limited to
64k.
flash-cookie-location
Specifies the BIG-IP URL location of the SWF file that
JavaScript requests to get the Flash file. This path cannot
be none and must start with '/'.
flash-cookies
Specifies, when enabled, that the system may use a Flash
shared object (FSO) as a place to store an alternative
malware cookie. This cookie tells the system, after a login
attempt, that this user has malware, and the system sends an
alert.
generic-whitelist-words
Deprecated since v13.0.0. Please use generic-whitelist-words
in detected-malware instead. Adds, deletes, or replaces a set
of generic blacklisted words that are ignored.
inline-scripts-whitelist-signatures
Adds, deletes, or replaces a set of signatures for allowed
inline scripts. In case a signature appears as part of
JavaScript inline script, the system does not count this
script in the source integrity feature.
removed-scripts
Specifies how the system detects self-removed malicious
scripts. You can configure the following options for removed
scripts detection:
blacklist-functions
Adds, deletes, or replaces a set of functions that are
used for detecting self-removed malicious scripts.
whitelist-functions
Adds, deletes, or replaces a set of functions that are
NOT used for detecting self-removed malicious scripts.
same-domain-scripts-validation-header
Specifies the name of the custom HTTP header used to identify
PING-PONG requests between JavaScript and BIG-IP for same-
domain scripts validations. This name cannot be none.
self-bait-header
Specifies the name of the custom HTTP header used to identify
self-bait requests from JavaScript to BIG-IP for malicious
injections scan. This name cannot be none.
source-integrity-location
Specifies the BIG-IP URL path where the system collects
information about the HTML source from multiple users. This
path cannot be none and must start with '/'.
web-rootkit
Specifies how the system detects Web-RootKit malware. You can
configure the following options for Web-RootKit detection:
blacklist-functions
Adds, deletes, or replaces a set of additional functions
to be checked.
whitelist-functions
Adds, deletes, or replaces a set of native functions
that are allowed to be overwritten.
mobilesafe
Specifies how the system detects and prevents phishing, Trojan,
and pharming attacks on mobile devices in real time. You can
configure the following options for mobile security:
alert-custom-config
Specifies alert custom configuration for SDK forward
compatibility. Note: For certain advanced configurations, F5
support may provide a relevant string to be entered here,
please do not use it on your own.
alert-threshold
Specifies the minimal score for sending alerts from mobile
devices.
app-integrity
Specifies how the system checks if the application on the
mobile device has been tampered with. You can configure the
following options for Application integrity:
custom-config
Specifies custom configuration of Application integrity
for SDK forward compatibility. Note: For certain
advanced configurations, F5 support may provide a
relevant string to be entered here, please do not use it
on your own.
[enabled | disabled]
Enables or disables Application integrity.
android
Specifies Application integrity settings for Android
platform. You can configure the following options for
Android Application integrity:
score
Specifies Application integrity score for Android
platform.
signature
Specifies signature of Android application (in
hexadecimal format).
ios Specifies Application integrity settings for iOS
platform. You can configure the following options for
iOS Application integrity:
hashes
Adds, deletes, or replaces a set of iOS Application
hashes (in base64-encoded format). You can
configure the following options for iOS Application
hash:
version
Specifies iOS Application version for this
hash.
score
Specifies Application integrity score for iOS
platform.
general-custom-config
Specifies general custom configuration for SDK forward
compatibility. Note: For certain advanced configurations, F5
support may provide a relevant string to be entered here,
please do not use it on your own.
malware
Specifies how the system checks for malicious applications on
the customer's mobile devices. You can configure the
following options for Malware detection:
android
Specifies Malware detection settings for Android
platform. You can configure the following options for
Android Malware detection:
custom-malware
Adds, deletes, or replaces a custom set of checked
malware for Android platform. You can configure the
following options for each Android malware:
package
Specifies package of checked Android malware.
score
Specifies score for checked Android malware.
custom-whitelist
Adds, deletes, or replaces a custom set of
whitelist applications for Android platform. You
can configure the following options for each
whitelist Android application:
package
Specifies package of whitelist Android
application.
check-custom
Enables or disables custom malware check.
check-generic
Enables or disables generic malware check.
custom-config
Specifies custom configuration of Malware detection for
SDK forward compatibility. Note: For certain advanced
configurations, F5 support may provide a relevant string
to be entered here, please do not use it on your own.
[enabled | disabled]
Enables or disables Malware detection.
ios Specifies Malware detection settings for iOS platform.
You can configure the following options for iOS Malware
detection:
custom-malware
Adds, deletes, or replaces a custom set of checked
malware for iOS platform. You can configure the
following options for each iOS malware:
path Specifies path of checked iOS malware.
score
Specifies score for checked iOS malware.
custom-whitelist
Adds, deletes, or replaces a custom set of
whitelist applications for iOS platform. You can
configure the following options for each whitelist
iOS application:
path Specifies path of whitelist iOS application.
behaviour-analysis
Specifies how the system checks for suspicious behavior
and characteristics on all applications on the
customer's mobile devices. You can configure the
following options for behavior analysis:
run Enables or disables behaviour analysis run.
score
Specifies score for behavior analysis.
mitm Specifies how the system checks the defined domains for DNS
Spoofing and Certificate Forging on customer devices. You can
configure the following options for Man-in-the-middle
detection:
certificate-custom-config
Specifies custom configuration of Certificate forging
detection for SDK forward compatibility. Note: For
certain advanced configurations, F5 support may provide
a relevant string to be entered here, please do not use
it on your own.
dns-custom-config
Specifies custom configuration of DNS spoofing detection
for SDK forward compatibility. Note: For certain
advanced configurations, F5 support may provide a
relevant string to be entered here, please do not use it
on your own.
domains
Adds, deletes, or replaces a set of domains for Man-in-
the-middle detection. You can configure the following
options for a MITM domain:
dns Specifies DNS spoofing detection settings for this
domain. You can configure the following options for
DNS spoofing detection:
ip-ranges
Adds, deletes, or replaces a set of IP address
ranges for DNS spoofing detection.
spoofing-score
Specifies score for DNS spoofing detection.
certificate
Specifies Certificate forging detection settings
for this domain. You can configure the following
options for Certificate forging detection:
forging-score
Specifies score for Certificate forging
detection.
hash Specifies certificate hash.
[enabled | disabled]
Enables or disables Man-in-the-middle detection.
os-security
Specifies how the system checks the customer's mobile devices
for old, unsupported, and unpatched operation system (OS)
versions. You can configure the following options for OS
security:
android
Specifies OS security settings for Android platform. You
can configure the following options for Android OS
security:
versions
Adds, deletes, or replaces an ordered set of
version ranges for Android platform. You can
configure the following options for Android version
range:
from Specifies Android version number from which OS
is unpatched.
priority
Specifies a unique ordinal number for Android
version range in the set. This option is
required for the operations add, delete,
modify, and replace-all-with.
score
Specifies score for Android version range.
to Specifies Android version number to which OS
is unpatched.
custom-config
Specifies custom configuration of OS security for SDK
forward compatibility. Note: For certain advanced
configurations, F5 support may provide a relevant string
to be entered here, please do not use it on your own.
[enabled | disabled]
Enables or disables OS security.
ios Specifies OS security settings for iOS platform. You can
configure the following options for iOS OS security:
versions
Adds, deletes, or replaces an ordered set of
version ranges for iOS platform. You can configure
the following options for iOS version range:
from Specifies iOS version number from which OS is
unpatched.
priority
Specifies a unique ordinal number for iOS
version range in the set. This option is
required for the operations add, delete,
modify, and replace-all-with.
score
Specifies score for iOS version range.
to Specifies iOS version number to which OS is
unpatched.
untrusted-apps-score
Specifies score for untrusted applications.
rooting-jailbreak
Specifies how the system checks customer's mobile devices to
determine if they are rooted / jailbroken. You can configure
the following options for Rooting / Jailbreak detection:
custom-config
Specifies custom configuration of Rooting / Jailbreak
detection for SDK forward compatibility. Note: For
certain advanced configurations, F5 support may provide
a relevant string to be entered here, please do not use
it on your own.
[enabled | disabled]
Enables or disables Rooting / Jailbreak detection.
jailbreak-score
Specifies score for jailbreak on iOS platform.
rooting-score
Specifies score for rooting on Android platform.
name Specifies a unique name for the component. This option is required
for the commands create, delete, and modify.
partition
Displays the administrative partition within which the component
resides.
phishing
Specifies how the system detects a phishing attempt. You can
configure the following options for phishing site detection:
alert-path
Specifies the BIG-IP URL path for alerts from the phishing
inline script. This path cannot be none and must start with
'/'.
allowed-elements
Adds, deletes, or replaces a set of URLs in requests for
which the system does not verify (check) the referrer header
value.
allowed-referrers
Adds, deletes, or replaces a set of domain names that are
allowed to appear in the referrer header when requesting
protected resources.
application-css
Specifies, when enabled, that the system injects the CSS
content to the existing application CSS files.
application-css-locations
Adds, deletes, or replaces a set of server URL locations of
the application CSS files, used when application-css is
enabled.
css-attribute-name
Specifies the attribute name as part of the CSS content. This
name cannot be none.
css-location
Specifies the BIG-IP URL location of the CSS file, used when
application-css is disabled. Injecting JavaScript protects
the web application against phishing attempts because even if
an attacker removes the injected JavaScript from the copied
web page, the CSS element is not modified, and this triggers
an alert. This path cannot be none and must start with '/'.
expiration-checks
Specifies, when enabled, that the system sends an alert if
expired JavaScript engine files are used, as this is an
indication of a phishing attack.
image-location
Specifies the BIG-IP URL location of the 1x1 pixel image
file. If an attacker copies a web page with this image, it
most likely lacks the JavaScript, and this triggers an alert.
This path cannot be none and must start with '/'.
inject-css-element
Deprecated since v12.1.3 (excluding v13.0.0). Please use same
configuration in a specific URL instead. Specifies where the
system injects the CSS element. You can configure the
following options for CSS element injection position:
[after | before]
Deprecated since v12.1.3 (excluding v13.0.0). Please use
same configuration in a specific URL instead. Specifies
whether the system injects the CSS element after an
opening tag or before a closing tag.
tag Deprecated since v12.1.3 (excluding v13.0.0). Please use
same configuration in a specific URL instead. Specifies
the HTML tag for injection of the CSS element. This tag
cannot be none.
inject-css-link
Deprecated since v12.1.3 (excluding v13.0.0). Please use same
configuration in a specific URL instead. Specifies where the
system injects the CSS link, when application-css is
disabled. You can configure the following options for CSS
link injection position:
[after | before]
Deprecated since v12.1.3 (excluding v13.0.0). Please use
same configuration in a specific URL instead. Specifies
whether the system injects the CSS link after an opening
tag or before a closing tag.
tag Deprecated since v12.1.3 (excluding v13.0.0). Please use
same configuration in a specific URL instead. Specifies
the HTML tag for injection of the CSS link. This tag
cannot be none.
inject-inline-javascript
Deprecated since v12.1.3 (excluding v13.0.0). Please use same
configuration in a specific URL instead. Specifies where the
system injects the phishing inline script and image. You can
configure the following options for phishing inline script
and image injection position:
[after | before]
Deprecated since v12.1.3 (excluding v13.0.0). Please use
same configuration in a specific URL instead. Specifies
whether the system injects the phishing inline script
and image after an opening tag or before a closing tag.
tag Deprecated since v12.1.3 (excluding v13.0.0). Please use
same configuration in a specific URL instead. Specifies
the HTML tag for injection of the phishing inline script
and image. This tag cannot be none.
protected-elements
Adds, deletes, or replaces a set of URLs in requests for
which the system verifies (checks) the referrer header value.
You can use wildcards, for example *.gif.
referrer-checks
Specifies, when enabled, that the system verifies (checks)
requests coming to the web application for resources from
different domains.
referrer-info-header
Specifies the name of the custom HTTP header used by client side
to communicate referrer and view identifier to BIG-IP.
risk-engine-path
Specifies the BIG-IP URL path to where a risk-engine report is
sent by client. This path cannot be none and must start with '/'.
risk-engine-publisher
Specifies the name of the log publisher used for reports to a Risk
engine.
rules
Adds, deletes, or replaces a set of rules used by the system to
perform actions upon detected events. You can configure the
following options for each rule:
action
Specifies the type of the action that the system performs
when this event is detected. The options are:
block-user
Specifies that the system adds the user with block mode
to be enforced from the next login.
forensic
Specifies that the system adds the user with forensic
mode to be enforced from the next login.
inspection
Specifies that the system adds the user with inspection
mode to be enforced from the next login.
redirect
Specifies that the system redirects the next request to
a specific web page.
remediation
Specifies that the system adds the user with remediation
mode to be enforced from the next login.
route
Deprecated in v13.1.0. Specifies that the system routes
to a specific pool all subsequent requests for a
specific time.
web-service
Specifies that the system sends a POST request to a
specific Web service.
duration
Specifies number of minutes during which the system performs
the action block-user, forensic, inspection, remediation or
route.
enforce-policy
Specifies enforcement policy for the action block-user,
forensic, inspection or remediation. The options are:
enforce
Specifies that the system adds the user mode with the
enforce policy.
time-limited
Specifies that the system adds the user mode with the
time-limited policy.
unlimited
Specifies that the system adds the user mode with the
unlimited policy.
event
Specifies a unique event for the rule. This option is
required for the operations create, delete, modify, and
replace-all-with. The options are:
auto-transaction
Specifies that the action is performed when the system
detects automatic (bot) transaction.
client-network-connection
Specifies that the action is performed when the system
detects that client network connectivity is blocked.
client-side-missing-components
Specifies that the action is performed when the system
detects missing components on the client side.
encryption-failure
Specifies that the action is performed when the system
fails to decrypt a password.
generic-malware
Specifies that the action is performed when the system
detects generic malware.
mandatory-words
Specifies that the action is performed when the system
detects that mandatory words are changed in the page.
phishing
Specifies that the action is performed when the system
detects a phishing attempt.
phishing-user
Specifies that the action is performed when the system
detects a user attacked by a phishing attempt.
rat-detection
Specifies that the action is performed when the system
detects a Remote Access Trojan (RAT) on a client web
browser.
referrer-checks
Specifies that the action is performed when the system
detects a request from a different domain by the
referrer header.
server-side-missing-components
Specifies that the action is performed when the system
detects missing components on the BIG-IP.
source-integrity
Specifies that the action is performed when the system
detects a mismatch of the URL's HTML source code.
web-injection
Specifies that the action is performed when the system
detects an attempt to inject malware.
min-score
Specifies the lowest score of this event necessary for the
system to perform the action.
payload
Specifies the payload for the web-service action.
pool Specifies the name of the pool for the route action.
publisher
Specifies the name of the log publisher for the web-service
action.
url Specifies the URL for the action redirect or web-service.
suggested-username-header
Specifies the name of the custom HTTP header in AJAX requests
added by JavaScript with a username value identified on the client
side.
trigger-irule
Specifies, when enabled, that the system activates Anti-fraud
iRule events. The default value is disabled.
urls Adds, deletes, or replaces a set of URLs in the web application
that are protected by the system. You can configure the following
options for a protected URL:
app-layer-encryption
Specifies how the system performs Application layer
encryption for this URL. With Application layer encryption,
the system detects an attempt to steal and tamper with end-
user passwords (or other protected information), and also
prevents it by encrypting the protected information. You can
configure the following options for Application layer
encryption:
add-decoy-inputs
Specifies, when enabled, that the system randomly and
continuously generates and removes decoy fields
that are added to the web page, thus making it harder
for an attacker to identify sensitive information with
either JavaScript or a proxy. In order to enable it, you
must first enable html-field-obfuscation.
auto-complete-block
Specifies, when enabled, that the system prevents auto-
complete functionality in browser.
auto-complete-whitelist-functions
Specifies a list of customer-specific global functions
that require access to the value of a parameter with
substitute-value enabled.
custom-encryption-function
Specifies the name or implementation of custom
encryption function to be run instead of built-in
encryption.
[enabled | disabled]
Specifies whether the system protects this URL with
Application layer encryption, and sends an alert if an
attacker attempts to breach Application layer encryption
for this URL, or not.
fake-strokes
Specifies, when enabled, that the system protects
against in-browser key loggers by generating fake
keyboard events.
full-ajax-encryption
Specifies, when enabled, that the system encrypts the
full AJAX payload.
hide-password-revealer
Specifies, when enabled, that the system hides the
password revealer icon found in web pages.
html-field-obfuscation
Specifies, when enabled, that the system encrypts the
names of defined fields on the client, and then
decrypts them back to the original names on the BIG-IP.
real-time-encryption
Specifies, when enabled, that the system encrypts
passwords as they are typed (even before the user clicks
the Submit button in a web form).
remove-element-ids
Specifies, when enabled, that the system removes the ID
attribute from the fields in a web form. In
order to enable it, you must first enable html-field-
obfuscation.
remove-event-listeners
Specifies, when enabled, that the system removes event
listeners from the encrypted fields in a web
form.
stolen-creds
Specifies, when enabled, that the system examines
whether the user was trying to use a fabricated
password.
substitute-value-function
Specifies a JavaScript function that receives the real
password as an argument and returns a fake value.
auto-transactions
Specifies how the system protects this URL from automatic
(bot) transactions. You can configure the following options
for Automated transactions detection:
attach-ajax-payload-to-alerts
Specifies whether to attach the actual AJAX payload to
alerts. Use the DB variable
antifraud.antifraud.maxalertrequestsize to limit the
attached payload size.
bot-score
Specifies the score added to an alert that is triggered
if the system determines that the client is a bot and
not a human. The default is a score of 50.
browser
Specifies, when enabled, that the system looks for bot
automation performed within the browser.
click-score
Specifies the score added to an alert that is triggered
if the min-mouse-over-count and min-mouse-move-count
conditions are not met. The default is a score of 40.
[enabled | disabled]
Specifies whether the system protects this URL against
non-human transactions, and sends an alert if the system
detects a non-human transaction attempt for this URL, or
not.
full-ajax-integrity
Specifies, when enabled, that the system verifies
whether the full AJAX payload was changed by malware
when it left the browser for the server.
integrity-fail-score
Specifies the score added to an alert that is triggered
if the system detects a difference between the actual
parameter value and the expected value of a protected
parameter sent after a user clicks a web form's Submit
button. The default is a score of 40.
min-mouse-move-count
Specifies the minimum number of mouse movements
necessary per page load in order for the system to
consider the transaction to be of human origin. The
default is 5 movements.
min-mouse-over-count
Specifies the minimum number of times the client's mouse
is positioned over the Submit button in a web form in
order for the system to consider the transaction to be
of human origin. The default is 2 button interactions.
min-report-score
Specifies the lowest score necessary for the system to
send an alert. The default value is 50.
min-time-to-request
Specifies the minimum amount of time (in seconds)
permitted between when a web form is opened and the
Submit button is clicked. The default is 2 seconds.
non-browser
Specifies, when enabled, that the system looks for bot
automation performed not within the browser.
not-human-score
Specifies the score added to an alert that is triggered
if the system only suspects that the client is a bot and
not a human. The default is a score of 25.
strong-integrity
Specifies, when enabled, that Enhanced Data Integrity is
active. When Enhanced Data Integrity is active, the
system detects a difference between the actual parameter
value and the expected value of a protected parameter
verified with physical input events.
strong-integrity-user-functions
Adds, deletes, or replaces a set of configures a list of
customer functions that change a parameter value
protected by Enhanced Data Integrity.
submit-buttons
Adds, deletes, or replaces a set of non-standard Submit
buttons found in forms of the web application. You can
specify the name, or the CSS syntax (ID, class, or
tagname) for each button.
tampered-cookie-score
Specifies the score added to an alert that is triggered
if the system detects that the transaction-data cookie
was tampered with. The default is a score of 50.
time-fail-score
Specifies the score added to an alert that is triggered
if the min-time-to-request condition is not met. The
default is a score of 20.
custom-alerts
Adds, deletes, or replaces a set of user-defined alerts sent
by the system upon searches in different parts of the
request. You can configure the following options for each
user-defined alert:
attach-request-part
Specifies whether to attach the original client-side
request to this alert.
component
Specifies the alert component that the system sends in
this alert. Select either: malware (the default value),
phishing, auto-transactions, or mobilesafe.
header-name
Specifies a header name in which the system searches for
the value when search-in is header.
malware-name
Specifies the malware detected by this alert when
component is malware.
message
Specifies the user-defined message that the system sends
in this alert.
search-in
Specifies the part of the request where the system must
find the value to send this alert. Note: If you create a
user-defined alert, you can use either request part,
thereafter it becomes read only.
client-ip
Specifies that the systems sends this alert if the
client IP address equals to the value.
header
Specifies that the systems sends this alert if the
header-name header contains the value.
payload
Specifies that the systems sends this alert if the
request payload contains the value.
query-string
Specifies that the systems sends this alert if the
URL query string contains the value.
value
Specifies a value that the system searches for in the
search-in part of the request. The default value is
none, which means that the system searches for any
value.
before-load-function
Specifies the implementation of additional function to be run
before JavaScript load, in the following format:
function(configs){...}. Note: For certain advanced
configurations, F5 support may provide relevant code to be
entered here, please do not use it on your own.
description
Specifies an optional description of this URL.
destination-urls
Specifies a list of destination URLs for requests from SPA
URLs/Views.
fallback-to-base-url
Specifies if a request to a non-configured view should use
same configuration as the base URL or disable FPS for that
request.
include-query-string
Specifies, when enabled, that the system includes query
string of URLs to match this wildcard expression. The default
value is disabled.
inject-javascript
Enables or disables JavaScript injection into responses to
this URL. The default value is enabled.
inject-main-javascript
Specifies where the system injects the main JavaScript. You
can configure the following options for main JavaScript
injection position:
[after | before]
Specifies whether the system injects the main JavaScript
after an opening tag or before a closing tag.
tag Specifies the HTML tag for injection of the main
JavaScript. This tag cannot be none.
inject-javascript-removal
Specifies where the system injects the JavaScript removal
detection image. You can configure the following options for
JavaScript removal detection image injection position:
[after | before]
Specifies whether the system injects the JavaScript
removal detection image after an opening tag or before a
closing tag.
tag Specifies the HTML tag for injection of the JavaScript
removal detection image. This tag cannot be none.
login-response
Specifies validation criteria on the response of this URL
when it is Login page. You must configure at least one of
them. If you configure more than one validation criteria,
then all the criteria must be fulfilled for successful login.
You can configure the following Login page properties:
status-code
Specifies an HTTP response status code that the server
must return to the user upon successful login.
domain-cookie
Specifies a defined domain cookie that the successful
response to the login URL must include.
exclude-string
Specifies a string that should NOT appear in the
successful response to the login URL.
header
Specifies a header name and value that the successful
response to the login URL must match.
include-string
Specifies a string that should appear in the successful
response to the login URL.
validation
Enables or disables successful login validation.
malware
Specifies when the system detects attempts of attackers to
inject malware in the URL. You can configure the following
options for Malware detection:
attach-html-to-alerts
Specifies, when enabled, that the system attaches
forensics information along with the alerts.
auto-learn-form-tags
Specifies, when enabled, that the system learns the
number of HTML form tags that appear in the URL. In
order to enable it, you must first enable source-
integrity.
auto-learn-input-tags
Specifies, when enabled, that the system learns the
number of HTML input tags that appear in the URL. In
order to enable it, you must first enable source-
integrity.
auto-learn-script-tags
Specifies, when enabled, that the system learns the
number of HTML script tags that appear in the URL. In
order to enable it, you must first enable source-
integrity.
blocked-enter-key-detection
Specifies, when enabled, that the system detects blocked
"Enter" key.
deferred-execution
Specifies, when enabled, that the system detects
deferred execution attack.
domain-availability
Specifies, when enabled, that the system checks that
client network connectivity is not blocked by malware.
enable-symbols
Specifies, when enabled, that the system looks for
malware strings (signatures) within JavaScript.
[enabled | disabled]
Specifies whether the system protects this URL against
injected malware, and sends an alert if this URL is
detected to have malware, or not.
external-injection
Specifies, when enabled, that the system detects
malicious scripts injected from domains not in the
profile's allowed-domains.
generic-malware
Specifies, when enabled, that the system applies the
detection of generic malware, using honeypots.
manual-count-form-tags
Specifies the number of HTML forms that appear in the
URL.
manual-count-input-tags
Specifies the number of HTML inputs that appear in the
URL.
manual-count-script-tags
Specifies the number of HTML scripts that appear in the
URL.
rat-detection
Specifies, when enabled, that the system checks for
Remote Access Trojans (RATs) on clients' web browsers.
removed-scripts-detection
Specifies, when enabled, that the system detects
malicious scripts that removed their own injection from
the DOM.
same-domain-scripts-validation
Specifies, when enabled, that the system detects
malicious responds to same-domain scripts.
self-bait
Specifies, when enabled, that the system scans the
original source code of the page for malicious
injections.
source-integrity
Specifies, when enabled, that the system verifies that
the URL's HTML source code matches the HTML code sent
from the server. The source integrity feature counts
script tags that are external (with src) and inline
(without src).
vbklip-detection
Specifies, when enabled, that the system checks for
VBKlip malware.
visibility-check
Specifies, when enabled, that the system searches HTML
pages for words from visibility-check-items.
visibility-check-items
Adds, deletes, or replaces a set of words that must
appear in the web site's HTML pages and may not be
changed. If these words are changed, the system sends an
alert.
web-rootkit-detection
Specifies, when enabled, that the system detects malware
that overwrites native browser functions.
whitelist-dom-signatures
Adds, deletes, or replaces a set of hash-IDs of DOM
signatures that are permitted to appear in requests for
this URL, even though they are otherwise blacklisted by
the system for other URLs.
whitelist-words
Deprecated since v15.0.0. Please use
'whitelist-dom-signatures' configuration instead. Adds,
deletes, or replaces a set of words that are permitted
to appear in requests for this URL, even though they are
otherwise blacklisted by the system for other URLs.
mobilesafe-encryption
Specifies, when enabled, that the system protects requests
for this URL from mobile devices with Application layer
encryption.
parameters
Adds, deletes, or replaces a set of sensitive parameters
protected by the system. You can configure the following
options for each parameter:
ajax-mapping
Specifies the mapping between the parameter name and its
location in AJAX payload.
attach-to-vtoken-report
Specifies, when enabled, that the system adds the
parameter value data to the alerts.
check-integrity
Specifies, when enabled, that the system verifies
whether the user-input data was changed by malware when
it left the browser for the server.
encrypt
Specifies, when enabled, that the system encrypts the
parameter's value attribute.
identify-as-username
Specifies, when enabled, that the system considers this
parameter a username. Note: There may be only one such
parameter per URL, and its value is used only when login
is successful (according to the URL's login-response).
method
Deprecated since v14.1.0. Please use parameter
'search-in' configuration instead. Specifies the method
of the request from which the system gets the parameter
data. Select either: POST (the default value) or GET.
mobilesafe-encrypt
Specifies that this parameter contains the encrypted
fields from mobile devices. Note: There may be only one
such parameter per URL (usually called auth), it cannot
have other settings enabled and its method must be POST.
mobilesafe-entangle
Specifies that this parameter must be encrypted by
mobile devices. The system replaces its value in the
request payload and sends an alert if the mobilesafe-
encrypt parameter does not contain this field.
obfuscate
Specifies, when enabled, that the system encrypts the
parameter's name attribute.
priority
Specifies a unique ordinal number for this parameter in
the set of wildcard parameters.
search-in
Specifies the request part from which the system gets
the parameter data. Select either: payload or query-
string or any (the default value). If any is selected,
then the query string will be searched first and only if
the parameter is not found there, the payload will be
also searched in.
substitute-value
Specifies, when enabled, that the system substitutes the
parameter's value with asterisks [*] in the web
application while the form is being filled. In order to
enable it, you must first enable encrypt.
type Specifies a type of the parameter. Note: If you create a
parameter, you can use either type, thereafter it
becomes read only. The options are:
explicit
Specifies that the parameter has an exact path.
This is the default value.
wildcard
Specifies that any parameter that matches this
wildcard expression is considered protected.
phishing
Specifies when the system detects phishing attempts by
attackers who set up a fake URL that imitates the real URL.
You can configure the following options for Phishing
detection:
capture-users
Specifies, when enabled, that the system logs the
usernames and text fields (not passwords) of users
attacked by a phishing attempt.
copy-detection
Specifies, when enabled, that the system detects copied
web pages.
css-protection
Specifies, when enabled, that the system activates the
CSS module, which is part of the system's phishing
detection backup mechanism.
[enabled | disabled]
Specifies whether the system protects this URL against
phishing, and sends an alert if the system detects this
URL to be under a phishing attempt, or not.
field-types-to-send
Adds, deletes, or replaces a set of HTML input types
whose values should be included in phishing alerts.
inject-css-element
Specifies where the system injects the CSS element. You
can configure the following options for CSS element
injection position:
[after | before]
Specifies whether the system injects the CSS
element after an opening tag or before a closing
tag.
tag Specifies the HTML tag for injection of the CSS
element. This tag cannot be none.
inject-css-link
Specifies where the system injects the CSS link, when
application-css is disabled. You can configure the
following options for CSS link injection position:
[after | before]
Specifies whether the system injects the CSS link
after an opening tag or before a closing tag.
tag Specifies the HTML tag for injection of the CSS
link. This tag cannot be none.
inject-inline-javascript
Specifies where the system injects the phishing inline
script and image. You can configure the following
options for phishing inline script and image injection
position:
[after | before]
Specifies whether the system injects the phishing
inline script and image after an opening tag or
before a closing tag.
tag Specifies the HTML tag for injection of the
phishing inline script and image. This tag cannot
be none.
priority
Specifies a unique ordinal number for this URL in the set of
wildcard URLs.
type Specifies a type of the URL. Note: If you create a URL, you
can use either type, thereafter it becomes read only. The
options are:
explicit
Specifies that the URL has an exact path. This is the
default value.
wildcard
Specifies that any URL that matches this wildcard
expression is considered protected.
users
Adds, deletes, or replaces a set of users enforced by the system
upon successful login. You can configure the following options for
an enforced user:
modes
Adds or deletes a single mode in the set of existing user
modes.
mode Specifies a unique mode for the user. This option is
required for the operations add and delete. The options
are:
block
Specifies that the system blocks the user account
by displaying blocking-page.
forensic
Specifies that the system enforces the user to run
Forensics tool on his host by displaying forensic
html.
inspection
Specifies that the system turns on verbose activity
logging for this user, i.e. collects all HTML and
JS sources from sessions and sends this data to the
dashboard.
remediation
Specifies that the system enforces the user to run
Forensics tool in remediation mode that deploys
Anti-malware client on his host by displaying
forensic html.
duration
Specifies number of minutes during which the user is
enforced in this mode since its first login, when
enforce-policy is time-limited. After their expiration
the user mode will be removed automatically.
enforce-policy
Specifies enforcement policy for this user mode. The
options are:
enforce
Specifies that the user must download and run
Forensics tool in order to continue online actions.
Note: This policy may be specified only for the
modes forensic and remediation.
time-limited
Specifies that the user is enforced in this mode
for a limited time, namely until first-login-time +
duration minutes. When this policy is specified for
the modes forensic and remediation, the user may
skip downloading and running Forensics tool every
time.
unlimited
Specifies that the user is enforced in this mode
for unlimited time. When this policy is specified
for the modes forensic and remediation, the user
may skip downloading and running Forensics tool
every time.
first-login-time
Displays time when the user firstly logged in being in
this mode. A new user mode is added with value none and
it is updated automatically during traffic, when
enforce-policy is time-limited.
whitelist-custom-alerts
Specifies a list of predefined alerts that are ignored.
SEE ALSO
create, delete, edit, glob, list, ltm virtual, modify, regex, security,
security anti-fraud, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or
by any means, electronic or mechanical, including photocopying,
recording, or information storage and retrieval systems, for any
purpose other than the purchaser's personal use, without the express
written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2009-2015. All rights reserved.
BIG-IP 2019-01-23 security anti-fraud profile(1)