Typo fixes in modsecurity.md (#2274)
* Update modsecurity.md Some typo fixes * Update modsecurity.md
This commit is contained in:
parent
a025dac811
commit
1cf69b0337
1 changed files with 4 additions and 4 deletions
|
@ -4,13 +4,13 @@ ModSecurity is an open source, cross platform web application firewall (WAF) eng
|
||||||
|
|
||||||
The [ModSecurity-nginx](https://github.com/SpiderLabs/ModSecurity-nginx) connector is the connection point between NGINX and libmodsecurity (ModSecurity v3).
|
The [ModSecurity-nginx](https://github.com/SpiderLabs/ModSecurity-nginx) connector is the connection point between NGINX and libmodsecurity (ModSecurity v3).
|
||||||
|
|
||||||
The default modsecurity configuration file is located in `/etc/nginx/modsecurity/modsecurity.conf`. This is the only file located in this directory and contains the default recommended configuration. Using a volume we can replace this file with the desired configuration.
|
The default ModSecurity configuration file is located in `/etc/nginx/modsecurity/modsecurity.conf`. This is the only file located in this directory and contains the default recommended configuration. Using a volume we can replace this file with the desired configuration.
|
||||||
To enable the modsecurity feature we need to specify `enable-modsecurity: "true"` in the configuration configmap.
|
To enable the ModSecurity feature we need to specify `enable-modsecurity: "true"` in the configuration configmap.
|
||||||
|
|
||||||
**NOTE:** the default configuration use detection only, because that minimises the chances of post-installation disruption.
|
**NOTE:** the default configuration use detection only, because that minimises the chances of post-installation disruption.
|
||||||
The file `/var/log/modsec_audit.log` contains the log of modsecurity.
|
The file `/var/log/modsec_audit.log` contains the log of ModSecurity.
|
||||||
|
|
||||||
|
|
||||||
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.
|
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.
|
||||||
The directory `/etc/nginx/owasp-modsecurity-crs` contains the https://github.com/SpiderLabs/owasp-modsecurity-crs repository.
|
The directory `/etc/nginx/owasp-modsecurity-crs` contains the https://github.com/SpiderLabs/owasp-modsecurity-crs repository.
|
||||||
Using `enable-owasp-modsecurity-crs: "true"` we enable the use of the this rules.
|
Using `enable-owasp-modsecurity-crs: "true"` we enable the use of the rules.
|
||||||
|
|
Loading…
Reference in a new issue