@@ -20,7 +20,7 @@ SecRequestBodyAccess On
20
20
# Enable XML request body parser.
21
21
# Initiate XML Processor in case of xml content-type
22
22
#
23
- SecRule REQUEST_HEADERS:Content-Type "text/xml" \
23
+ SecRule REQUEST_HEADERS:Content-Type "(?:application(?:/soap\+|/)| text/) xml" \
24
24
"id:'200000',phase:1,t:none,t:lowercase,pass,nolog,ctl:requestBodyProcessor=XML"
25
25
26
26
# Enable JSON request body parser.
@@ -40,7 +40,7 @@ SecRequestBodyLimit 13107200
40
40
SecRequestBodyNoFilesLimit 131072
41
41
42
42
# Store up to 128 KB of request body data in memory. When the multipart
43
- # parser reachers this limit, it will start using your hard disk for
43
+ # parser reaches this limit, it will start using your hard disk for
44
44
# storage. That is slow, but unavoidable.
45
45
#
46
46
SecRequestBodyInMemoryLimit 131072
@@ -110,7 +110,7 @@ SecRule TX:/^MSC_/ "!@streq 0" \
110
110
# Do keep in mind that enabling this directive does increases both
111
111
# memory consumption and response latency.
112
112
#
113
- # SecResponseBodyAccess On
113
+ SecResponseBodyAccess On
114
114
115
115
# Which response MIME types do you want to inspect? You should adjust the
116
116
# configuration below to catch documents but avoid static files
@@ -151,7 +151,7 @@ SecDataDir c:\inetpub\temp\
151
151
# location must be private to ModSecurity. You don't want other users on
152
152
# the server to access the files, do you?
153
153
#
154
- #SecUploadDir /opt/modsecurity/var/upload/
154
+ #SecUploadDir c:\inetpub\temp\
155
155
156
156
# By default, only keep the files that were determined to be unusual
157
157
# in some way (by an external inspection script). For this to work you
@@ -171,7 +171,7 @@ SecDataDir c:\inetpub\temp\
171
171
# The default debug log configuration is to duplicate the error, warning
172
172
# and notice messages from the error log.
173
173
#
174
- #SecDebugLog /opt/modsecurity/var/log/ debug.log
174
+ #SecDebugLog c:\inetpub\temp\ debug.log
175
175
#SecDebugLogLevel 3
176
176
177
177
@@ -181,17 +181,17 @@ SecDataDir c:\inetpub\temp\
181
181
# trigger a server error (determined by a 5xx or 4xx, excluding 404,
182
182
# level response status codes).
183
183
#
184
- # SecAuditEngine RelevantOnly
185
- # SecAuditLogRelevantStatus "^(?:5|4(?!04))"
184
+ SecAuditEngine RelevantOnly
185
+ SecAuditLogRelevantStatus "^(?:5|4(?!04))"
186
186
187
187
# Log everything we know about a transaction.
188
- # SecAuditLogParts ABIJDEFHZ
188
+ SecAuditLogParts ABIJDEFHZ
189
189
190
190
# Use a single file for logging. This is much easier to look at, but
191
191
# assumes that you will use the audit log only ocassionally.
192
192
#
193
- # SecAuditLogType Serial
194
- # SecAuditLog c:\inetpub\log\modsec_audit.log
193
+ SecAuditLogType Serial
194
+ SecAuditLog c:\inetpub\log\modsec_audit.log
195
195
196
196
# Specify the path for concurrent audit logging.
197
197
#SecAuditLogStorageDir c:\inetpub\log\
@@ -216,8 +216,7 @@ SecCookieFormat 0
216
216
# to properly map encoded data to your language. Properly setting
217
217
# these directives helps to reduce false positives and negatives.
218
218
#
219
- #SecUnicodeCodePage 20127
220
- #SecUnicodeMapFile unicode.mappinga
219
+ SecUnicodeMapFile unicode.mapping 20127
221
220
222
221
# Improve the quality of ModSecurity by sharing information about your
223
222
# current ModSecurity version and dependencies versions.
0 commit comments