Web Application Firewall (Legacy)

This article explains the legacy version of WAF that underwent end-of-life on June 30, 2021. Our new version of WAF expands upon all of the capabilities offered by WAF (Legacy) and Rate Limiting (Legacy) with a simplified and centralized setup. Please upgrade to the latest version of WAF at your earliest convenience.

Learn how to automate tasks related to Web Application Firewall's:

This section describes endpoints in the mcc service.

Configuration

Endpoint Description

Add Instance - Discontinued

Creates a WAF instance.

Add Profile - Discontinued

Creates a WAF profile.

Add Profile by Template - Discontinued

Creates a WAF profile based on a template.

Delete Instance - Discontinued

Deletes a WAF instance.

Delete Profile - Discontinued

Deletes a WAF profile.

Get All Instances - Discontinued

Retrieves a list of WAF instances.

Get All Profiles - Discontinued

Retrieves a list of WAF profiles.

Get Available Policies - Discontinued

Retrieves a list of the policies associated with a rule set.

Get Available Rule Sets - Discontinued

Retrieves a list of the rule sets that may be assigned to a profile.

Get Available Rules - Discontinued

Retrieves a list of rules associated with a policy.

Get Available Templates - Discontinued

Retrieves a list of templates that may be leveraged when creating a WAF profile.

Get Instance by ID - Discontinued

Retrieves a WAF instance by its ID.

Get Instances by Profile - Discontinued

Retrieves a list of instances that have been associated with a specific profile.

Get Profile by ID - Discontinued

Retrieves a WAF profile by its ID.

Get Template - Discontinued

Retrieves the configuration associated with a template.

Update Instance - Discontinued

Updates a WAF instance.

Update Profile - Discontinued

Updates a WAF profile.

Threat Event Log

The following endpoints retrieve WAF threat event log information:

Endpoint Description

Get Available Event Log Fields

Provides definitions for event log fields.

Get Event Count

Indicates the total number of threats detected over a given time period.

Get Event Log Entries

Retrieves event log data over a given time period.

Get Event Log Entry

Retrieves detailed information for a specific event log entry.

Get Top Event Log Entries

Retrieves the top 10 events for the specified field.