Deploy GitHub Pages
This commit is contained in:
parent
2732c722e4
commit
e3d51fa211
9 changed files with 114 additions and 80 deletions
|
|
@ -1043,7 +1043,7 @@
|
|||
<p>The default ModSecurity configuration file is located in <code class="codehilite">/etc/nginx/modsecurity/modsecurity.conf</code>. This is the only file located in this directory and contains the default recommended configuration. Using a volume we can replace this file with the desired configuration.
|
||||
To enable the ModSecurity feature we need to specify <code class="codehilite">enable-modsecurity: "true"</code> in the configuration configmap.</p>
|
||||
<blockquote>
|
||||
<p><strong>Note:</strong> the default configuration use detection only, because that minimises the chances of post-installation disruption.
|
||||
<p><strong>Note:</strong> the default configuration use detection only, because that minimizes the chances of post-installation disruption.
|
||||
The file <code class="codehilite">/var/log/modsec_audit.log</code> contains the log of ModSecurity.</p>
|
||||
</blockquote>
|
||||
<p>The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue