waf biometrics-based-detection
By checking the client events such as mouse movement, keyboard, screen touch, and scroll, etc in specified period, FortiWeb judges whether the request comes from a human or from a bot. You can use this command to configure the biometrics based detection rule to define the client event, collection period, and the request URL, etc.
Syntax
config waf biometrics-based-detection
edit <biometrics-based-detection-name_str>
set mouse-movement {enable | disable}
set page-focus {enable | disable}
set screen-touch {enable | disable}
set keyboard {enable | disable}
set bot-traits {enable | disable}
set event-collection-time <time_int>
set bot-effective-time <time_int>
set action {alert | alert_deny | | deny_no_log}
set severity {high | medium | low | Info}
config url-list
edit <url-list_id>
set host <host_str>
set host-status {enable | disable}
set type {simple-string | regex-expression}
set url <url_str>
next
end
next
end
Variable | Description | Default |
---|---|---|
<biometrics-based-detection-name_str> | Type a unique name that can be referenced in other parts of the configuration. | No default. |
mouse-movement {enable | disable} | Enable to monitor the mouse movement event. | enable
|
Enable to monitor how long the user stays on the page. |
|
|
Enable to monitor the keyboard event. | enable
|
|
Enable to monitor the click event. | enable
|
|
Enable to monitor the screen touch event. | disable
|
|
Enable to monitor the scroll event. | disable
|
|
For the requests passing the Monitor Client Events check, you can enable
By examining these characteristics, it becomes possible to effectively identify and filter out malicious events that are artificially simulated by scripts. This is particularly useful in detecting web crawlers that leverage headless browsing techniques to simulate browser behaviors in order to bypass conventional bot detection methods. |
|
|
Specify how many bot traits should be detected to identify a client as a bot. The valid range is 2-10. |
5 |
|
Specify how long the events will be collected from the client. |
|
|
For the identified bot, choose the time period before FortiWeb tests and verifies the bot again. |
|
|
action {alert | alert_deny | | deny_no_log} |
Select which action FortiWeb will take when it detects a violation of the policy:
The default value is Alert. |
Alert
|
severity {high | medium | low | Info} |
When policy violations are recorded in the attack log, each log message contains a Severity Level (
|
Low
|
trigger <trigger_policy> | Select the trigger, if any, that FortiWeb will use when it logs and/or sends an alert email about a violation of the policy. For details, see Viewing log messages. | No default. |
<url-list_id> | Enter the sequence number of the URL. | No default. |
Select the name of a protected host that the |
No default. |
|
Enable to apply this rule only to HTTP requests for specific web hosts. Also configure host <host_str>. |
|
|
Select whether the url <url_str> field must contain either:
|
|
|
Depending on your selection in type {simple-string | regex-expression}, enter either:
|
No default. |
Related topics