Get action log contents:
# curl https://nemesida-security.com/nw/agent/get_event_log --data 'key=%License key or SHA256 hash%'
If you use an invalid license key, the response will be returned with the
Nemesida WAF dynamic module
Allows managing the settings of the Nemesida WAF dynamic module. Supports the following control commands:
The following parameters are available for control:
Nemesida AI MLC
Allows managing the settings of the Nemesida AI MLC module. The following control commands are supported:
Signature exclusion rules management
Allows configuring signature exclusion rules. The following control commands are supported:
Extended request blocking rules
The mechanism of extended request blocking rules allows you to use additional conditions for a more accurate result when drawing up personal rules. For example, you can create a rule by which the request will be blocked if:
- corresponds to a geographical location based on an IP address (determining the country by the attacker’s IP address);
- there is an appeal to a specific domain or URL;
- contains a specific header (for example,
Referrer, etc.) and/or the contents of these headers.
For a more accurate result, the parameters can be combined with each other. In this case, the rule will only work if all the conditions are met.
The following control commands are supported: