Protect Your Website Fast
  • Home
  • WAF Platform
  • AI Platform
  • SSL Certificates
    • DigiCert SSL
    • GeoTrust SSL
    • RapidSSL SSL
    • Sectigo SSL
    • Comodo SSL
    • Thawte SSL
  • Resources
    • Blog
    • Docs
  • Contact
  • My Account
Select Page

Getting Started & Account Management

4
  • Updating Contact and Billing Information
  • Requesting Your Free Website Migration
  • Step-by-Step CyberWAF Installation Guide
  • How to Access Your CyberWAF Control Panel

WAF & Core Security Features

4
  • Submitting a Malware Removal Request (SLA)
  • How to Handle False Positives (Whitelisting)
  • Managing Your Zero-Day Exploit Prevention Settings
  • Understanding WAF Rules and Filtering Modes

Performance & Hosting Management

4
  • How to Configure Email Accounts (Unlimited Email)
  • Setting Up Your Free SSL/TLS Certificate
  • Understanding NVMe SSD Storage & Performance Boost
  • Monitoring Your Resource Usage (CPU & RAM)

Billing, Plans & Licensing

4
  • Understanding the Service Level Agreement (SLA)
  • Invoice and Payment Management
  • How to Upgrade or Downgrade Your Service Plan
  • Comparing Basic, Business, and E-commerce WAF Plans

Troubleshooting & Advanced Configuration

4
  • Compliance and Security Best Practices
  • Using SSH Access and FTP for Advanced Users
  • How to Clear Your Website and Browser Cache
  • How to Fix 500 Internal Server Errors

Contact & Custom Solutions

4
  • How to Submit a Feature Request or Feedback
  • Requesting a Custom Infrastructure Quote
  • Understanding Our Support Response Times (SLAs)
  • How to Contact CyberWAF Support (24/7/365)

CMS & Application Integrations

4
  • Optimizing Database Connections
  • Customizing WAF for Custom PHP/Legacy Applications
  • Securing WooCommerce and E-commerce Platforms
  • Integrating WAF with WordPress and Other CMS

Backup, Restore & Data Management

4
  • Data Retention and Compliance
  • How to Perform a Granular (File or DB) Restore
  • How to Perform a Full Site Restore
  • Understanding the Daily Backup Service

Cyber Security Education & Glossary

4
  • Malware vs. Virus vs. Ransomware: Understanding the Differences
  • The OWASP Top 10 Explained (and how WAF blocks them)
  • What is a Zero-Day Exploit and How Does Virtual Patching Work?
  • Cyber Security Glossary: Key WAF & DDoS Terms
View Categories
  • Home
  • CyberWAF Knowledge Base
  • WAF & Core Security Features
  • Understanding WAF Rules and Filtering Modes

Understanding WAF Rules and Filtering Modes

1 min read

Learn the difference between monitoring and blocking modes, and how CyberWAF uses advanced rule sets to analyze and filter incoming traffic. #

What is a Web Application Firewall (WAF)? #

A WAF is a dedicated security layer (Layer 7) that filters, monitors, and blocks malicious HTTP traffic aimed at your web application. Unlike a traditional firewall, the WAF inspects the content of the data (forms, cookies, requests) to prevent application-specific attacks.

WAF Filtering Modes Explained #

Your WAF can typically operate in two main modes:

  1. Monitoring Mode (Passive): The WAF analyzes all incoming traffic and logs any malicious attempts it detects, but it does not block them. This mode is useful during initial deployment to tune rules and identify potential false positives before enabling full protection.

  2. Blocking Mode (Active): The standard, recommended mode. The WAF actively blocks any request that matches a known malicious signature (e.g., SQL Injection, XSS) before it reaches your application.

How Our Rule Sets Work #

CyberWAF utilizes constantly updated rule sets based on industry standards (like the OWASP Top 10) and proprietary intelligence. These rules are designed to recognize patterns indicative of attacks, such as:

  • Unusual characters or commands in form fields.

  • Attempts to access system files or directories.

  • Overly complex or repetitive queries (often indicative of brute force or scraping).

Updated on December 7, 2025

What are your Feelings

  • Happy
  • Normal
  • Sad

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Managing Your Zero-Day Exploit Prevention Settings

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Table of Contents
  • Learn the difference between monitoring and blocking modes, and how CyberWAF uses advanced rule sets to analyze and filter incoming traffic.
  • What is a Web Application Firewall (WAF)?
  • WAF Filtering Modes Explained
  • How Our Rule Sets Work
Copyright © GIGAS HOST SRL. All rights reserved.