Whitelists in dotDefender

Expand / Collapse

Summary

This article explains how to white list a request in dotDefender.

Applies To

Dedicated, Colocated, and Virtual Machines with dotDefender installed.

Steps

To whitelist a request in dotDefender logs, follow these steps.

  1. Log into the server via Remote Desktop. 
  2. Navigate to Start > Programs > Applicure dotDefender for IIS > dotDefender Administration Console.  The log in credentials are the same as the Remote Desktop credentials in most cases.
  3. Expand Default Security Profile > Patterns > Custom Rules.

If you are whitelisting a request from a specific existing rule:

  1. Click User Defined Request Rules. Find the rule and click on the page icon (on the right-hand side) to bring up the properties.
  2. In the URI text-box, enter a regular expression for the request you want whitelisted for the rule.

    Example: ^/tc/admin/groupemail/|^tc/admin/sitebuilder/
    This allows any request to http://anysite.com/tc/admin/groupemail and http://anysite.com/tc/admin/sitebuilder/
  3. Check the Apply this rule to all URIs except specified above checkbox.
  4. Click OK.
  5. Click the green arrow on the right-hand end of the top menu to apply the settings. You will receive a confirmation that the settings have been applied.

If you are adding a global whitelist (that the URI will not be passed through any rules), the process is the same, except you will be creating the whole rule instead of adjusting an existing one.

  1. Click User Defined Request Rules > Add New Rule and enter in a description for the rule. Click Next.
  2. The Description can be anything.  Generally what your rule is doing (or just your rule).  It won't change the way the whitelist works.

  3. Select the radio button for Search in custom fields of HTTP requests and click Next.


  4. Select the Standard HTTP request fields radio button and choose Match with incoming URI (REQUEST_URI) from the drop-down menu. Click Next.

  5. Enter your pattern.

    Example: http://mysite.com/tc/admin/sitebuilder

    For the Take action drop-down menu, select Allow request (whitelist).  Optionally, you can have dotDefender log these requests by checking the Write to Log checkbox.  However, if this is a heavily trafficked site, it would be wise to turn this off if you're whitelisting so as to not fill the logs.
  6. Click Next.
  7. Select Apply to all pages (as the rule itself is allowing all requests to the pages you want, entering a URI here is redundant).  Click Next and then click Finish.


  8. If there are multiple domains going to the site, it is recommended to edit the rule just created by clicking the page icon next to the rule. 
  9. Once this opens, adjust the keyword to reflect the change. To do this, remove everything except for the path of the request, which should be whitelisted (so http://mysite.com/tc/admin/sitebuilder becomes /tc/admin/sitebuilder).  You will also need to add a "^"  to the front of the path, which forces the match to be at the beginning of the PATH_INFO. This prevents whitelisting something like http://mysite.com/badcode/tc/admin/sitebuilder.
  10. Click OK to save the changes.
  11. Click the green arrow on the menu to apply the settings. You will receive a confirmation that the settings have been applied. 

Note: It is in your best interest to keep your rules all under the default policy.  This helps reduce the amount of confusion that can be had with individual sites having their own sets of rules and helps to enforce policies to all the sites.


Rate this Article:


Details
Category: IIS

Last Modified:Wednesday, December 23, 2015 11:21 AM

Type: HOWTO

Level: Intermediate

Article not rated yet.

Article has been viewed 2,177 times.

Options
Email Article Email Article


Social Bookmarks Social Bookmarks