WAF Features

The Prophaze Cloud WAF identifies and removes suspicious activity for HTTP GET and POST requests. Secure web application without changing your existing infrastructure or sacrificing performance.

WAF  Protection receives about million requests every second, and the WAF constantly recognizes and blocks new possible threats. WAF’s rule sets result in latency of less than 1 millisecond. Its offers security control for websites, applications, and APIs hosted on multiple cloud environments. Protection’s network shields internet assets across all cloud providers.

Key features

  1. Use WAF rules set to protect applications
  2. Create your own firewall rules
  3. Visualize and threats with firewall analytics
  4. Machine learning-based behavioural detection

WAF contains 3 packages:

  1. Product Managed Ruleset
  2. Package: OWASP ModSecurity Core Rule Set
  3. Customer Requested Rules
  4. ML Based Autogenerating rulesets

Other points:

  1. The WAF introduces a limited amount of latency (approximately 100 microseconds).
  2. WAF changes take about 30 seconds to update globally.
  3.  uses proprietary rules to filter traffic. 
  4. Established Websockets do not trigger the WAF for subsequent requests.
  5. The WAF parses JSON responses to identify vulnerabilities targeted at APIs. The WAF limits JSON payload parsing to 128KB.

WAF false positives and false negatives

By default, the Web Application Firewall (WAF) is fully managed via the dashboard and is compatible with most websites and web applications. However, false positives and false negatives are possible considering the immense Internet:

  1. False positives: Legitimate requests detected and filtered as malicious.
  2. False negatives: Malicious requests not filtered.

Product Managed Ruleset

The Product Managed Ruleset contains security rules written and curated by the product owned Company. Click on a ruleset name under Group to reveal the rule descriptions. This Specials is a Group that provides core WAF security against common attacks. Additionally, only enable rule groups that correspond to your technology stack. For example, if you use WordPress, enable the WordPress group.

When viewing a ruleset, it shows default actions for each rule listed under Default mode. The Mode available for individual rules within a specific Product Managed Ruleset are:

  1. Default – takes the default action listed under Default mode when viewing a specific rule.
  2. Disable – turns off the specific rule within the group.
  3. Block – the request is discarded.
  4. Challenge – the visitor receives a CAPTCHA challenge page.
  5. Simulate – the request is allowed through but is logged in the Activity log.

The WAF change log allows customers to monitor ongoing changes to the Product Managed Ruleset.

OWASP package

OWASP ModSecurity Core Rule Set assigns a score to each request based on how many OWASP rules trigger. Some OWASP rules have a higher sensitivity score than others. After OWASP evaluates a request, it compares the final score to Sensitivity configured for the domain. If the score exceeds the Sensitivity, the request is actioned based on the Action configured within Package: OWASP ModSecurity Core Rule Set:

  1. Block – the request is discarded.
  2. Challenge – the visitor receives a CAPTCHA challenge page.
  3. Simulate – the request is allowed through but is logged in the Activity log.

The sensitivity score required to trigger the WAF for a specific Sensitivity is as follows:

  1. Low – 60 and higher
  2. Medium – 40 and higher
  3. High – 25 and higher

For Ajax requests, the following scores are applied instead:

  1. Low – 120 and higher
  2. Medium – 80 and higher
  3. High – 65 and higher

Review the Activity log to see the final score as well as the individual triggered rules.


Key features Benefit
Deep Packet Inspection, covering applications / Layer 7 Ensures your standard and custom web applications are always protected from SQL injection, cross-site scripting attacks and thousands more
SSL Terminate SSL connections without any overhead or additional latency. Apply your WAF policy to SSL encrypted traffic without having to upload certificates or invest in costly hardware solutions
For GET and POST HTTP/S requests Covers range of HTTP/S traffic
URL-specific custom rule sets Allows you to include/exclude specific URLs or subdomains for WAF protection to test domains or include/ exclude specific subdomains
DDoS mitigation integration Allows full-stack protection against DDoS — no extra implementation required
IP reputation database integration Real-time intelligence on over 1 billion unique IPs used to block malicious traffic — no extra implementation required
Virtual patching Fixes a vulnerability before you patch your server or update your code, allowing you more time to patch and test updates.
Restrict by IP or geolocation Can blacklist/whitelist traffic from specific IP addresses or countries to protect against hackers from specific IPs or countries
Low false positive Overall 1/50M false positive rate ensures legitimate traffic reaches you
Full integration with CDN service, offering outbound content transformation Reduces web latency for your site visitors — no extra implementation required


Key features Benefit
High availability — built on service offering SLAs Business and Enterprise customers enjoy 100% uptime guarantee and financial penalties if not met
No hardware, software or tuning required Sign up with a simple change in DNS
PCI certification The service has received Level 1 service provider certification


Key features Benefit
Real-time logging Gain visibility to help you fine-tune the WAF
Access to raw log files Enterprise customers can conduct in-depth analysis covering all WAF requests

WAF Settings

Key features Benefit
Block Blocking an attack will stop any action before it is posted to your website.
Simulate To test for false positives, set the WAF to Simulate mode, which will record the response to possible attacks without challenging or blocking.
Challenge A challenge page asks visitors to submit a CAPTCHA to continue to your website.
Threshold / sensitivity setting Set rules to trigger more or less depending on sensitivity
Customizable block pages Customize the page a visitor sees when they’re blocked, e.g. “Call this telephone number for help.” Available for Enterprise customers.
Customizable block pages Customize the page a visitor sees when they’re blocked, e.g. “Call this telephone number for help.” Available for Enterprise customers.


Key features Benefit
Automatic learning paired with security-driven research Protects against zero-day vulnerabilities or new threats with patches automatically deployed by our security team
Compatibility with ModSecurity logic and format Allows you to easily import existing rule sets to maintain existing protection
Core OWASP ModSecurity rule sets Protects against OWASP vulnerabilities, the most critical flaws as identified by The Open Web Application Security Project (OWASP) — included as default with no extra fees
Zero-day rule sets Rely on security team to protect you against threats identified across our customer base — included as default with no extra fees
Platform-specific rule sets for major CMS and eCommerce platforms Receive protection out of the box with no extra fees for platforms such as WordPress, Joomla, Plone, Drupal, Magneto, IIS, etc.
Custom rules Cover situations unique to your web application included as default with no extra fees for Business and Enterprise customers