4. Security Rules

๐Ÿ›ก๏ธ Security Rules

The Security Rules section in ShieldsGuard provides powerful tools to filter, block, or manipulate specific aspects of incoming HTTP requests. This section empowers administrators to define granular behavioral policies, harden exposed endpoints, and mitigate suspicious or malicious activity on a per-rule basis.

Each rule type is modular, giving you complete control over how your system handles traffic based on IPs, headers, methods, paths, query strings, or even post payloads.

Below is a breakdown of what each rule type allows you to control:


๐Ÿ”ฒ BlackList & WhiteList

Define explicit IP addresses or CIDR ranges to block or allow regardless of other rules or protections.


๐Ÿ“˜ User Agent Filtering

Create rules based on the User-Agent header. Useful for blocking known bots, outdated clients, or malicious scanners.


๐Ÿงต Query String Filtering

Inspect query parameters and block requests that contain suspicious or forbidden values.


๐Ÿ“ฅ HTTP Header Filtering

Control request behavior by filtering based on specific HTTP headers, such as Referer, Origin, or custom-defined headers.


๐Ÿšซ Block POST Values

Prevent requests containing specific keywords or data patterns in POST bodies. Ideal for blocking form spam or injection attempts.


๐Ÿ”„ Custom Headers

Inject or modify custom headers into responses for security, debugging, or routing logic.


โ›” Block URL Requests

Block access to specific URL strings or patterns regardless of method or query.


๐Ÿงญ URL Path Blocking

Block entire URL path segments such as /admin, /debug, or /staging. Supports wildcards and nested directories.


๐Ÿ” Encrypt Path

Obfuscate sensitive paths using encryption to prevent reconnaissance and endpoint enumeration.


๐Ÿงน Remove Request Value

Strip or replace parts of the request URI, headers, or parameters before it reaches backend services.


๐Ÿšซ Exclude Directories from Protection

Bypass WAF/DDoS inspection for specific static folders (e.g., /uploads, /assets) to improve performance or avoid unnecessary filtering.


๐Ÿง  These security rules act as a flexible policy enforcement layer โ€” perfect for scenarios where WAF alone is not enough or too generalized.

Proper use of Security Rules gives you surgical control over traffic behavior, making ShieldsGuard a highly adaptable security platform for modern, high-risk environments.

4.1 BlackList & WhiteList4.2 User Agent Filtering4.3 Query String Filtering4.4 HTTP Header Filtering4.5 Block POST Values4.6 Custom Headers4.7 Block URL Requests4.8 URL Path Blocking4.9 Encrypt Path4.10 Remove Request Value4.11 Exclude Directories from Protection

Last updated