Description | This article describes how to bypass anomaly detection for Machine Learning for a specific URL parameter. It is necessary to preconfigure other respective server policy and Machine Learning setups and refer to the documentation at the end of this article for more information on configuring the server policy and Machine Learning. |
Scope | FortiWeb and FortiWeb VM. |
Solution |
There is a requirement to bypass anomaly detection for Machine Learning for a specific URL parameter.
For example, below attack log sample, and the parameter 'username' is detected by Machine Learning (Anomaly in HTTP argument).
Note that:
4. Scroll down until the gear icon. Select the gear icon and select Discard. A slide-in popup will appear for confirmation. Select OK.
5. The HMM Learning Stage will change to Discarded.
Refer to below documentation for more information on configuring server policy:
Refer to below documentation for more information on configuring Machine Learning:
https://docs.fortinet.com/document/fortiweb/7.2.1/administration-guide/441053/parameter-view |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.