LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF โ€“ Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started

4. Security Rules

๐Ÿ›ก๏ธ Security Rules

The Security Rules section in ShieldsGuard provides powerful tools to filter, block, or manipulate specific aspects of incoming HTTP requests. This section empowers administrators to define granular behavioral policies, harden exposed endpoints, and mitigate suspicious or malicious activity on a per-rule basis.

Each rule type is modular, giving you complete control over how your system handles traffic based on IPs, headers, methods, paths, query strings, or even post payloads.

Below is a breakdown of what each rule type allows you to control:


๐Ÿ”ฒ BlackList & WhiteList

Define explicit IP addresses or CIDR ranges to block or allow regardless of other rules or protections.


๐Ÿ“˜ User Agent Filtering

Create rules based on the User-Agent header. Useful for blocking known bots, outdated clients, or malicious scanners.


๐Ÿงต Query String Filtering

Inspect query parameters and block requests that contain suspicious or forbidden values.


๐Ÿ“ฅ HTTP Header Filtering

Control request behavior by filtering based on specific HTTP headers, such as Referer, Origin, or custom-defined headers.


๐Ÿšซ Block POST Values

Prevent requests containing specific keywords or data patterns in POST bodies. Ideal for blocking form spam or injection attempts.


๐Ÿ”„ Custom Headers

Inject or modify custom headers into responses for security, debugging, or routing logic.


โ›” Block URL Requests

Block access to specific URL strings or patterns regardless of method or query.


๐Ÿงญ URL Path Blocking

Block entire URL path segments such as /admin, /debug, or /staging. Supports wildcards and nested directories.


๐Ÿ” Encrypt Path

Obfuscate sensitive paths using encryption to prevent reconnaissance and endpoint enumeration.


๐Ÿงน Remove Request Value

Strip or replace parts of the request URI, headers, or parameters before it reaches backend services.


๐Ÿšซ Exclude Directories from Protection

Bypass WAF/DDoS inspection for specific static folders (e.g., /uploads, /assets) to improve performance or avoid unnecessary filtering.


๐Ÿง  These security rules act as a flexible policy enforcement layer โ€” perfect for scenarios where WAF alone is not enough or too generalized.

Proper use of Security Rules gives you surgical control over traffic behavior, making ShieldsGuard a highly adaptable security platform for modern, high-risk environments.

Previous3.2 WAF โ€“ Web Application FirewallNext4.1 BlackList & WhiteList

Last updated 9 days ago

4.1 BlackList & WhiteList
4.2 User Agent Filtering
4.3 Query String Filtering
4.4 HTTP Header Filtering
4.5 Block POST Values
4.6 Custom Headers
4.7 Block URL Requests
4.8 URL Path Blocking
4.9 Encrypt Path
4.10 Remove Request Value
4.11 Exclude Directories from Protection