Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking
  3. Rules
  4. Connection Rules
  5. Security Rules
  6. Security Rule Set Simulator
  7. Masking Functions
  8. Glossary

Security Rule Parameters

Security Rule Parameters

The Rule Engine applies security rules to incoming SQL statements to identify a match to the criteria that you define. If a match occurs, the Rule Engine applies the security action to the SQL statement.
The following table describes the security rule parameters:
Parameter
Description
Rule Name
Name of the rule that appears in the rule tree.
Description
Optional rule description.
Matcher
Defines the portion of the SQL request that the Rule Engine must match to apply an action. Returns a match when the Rule Engine identifies a match.
Keep Matcher Result
Specifies that the Rule Engine must use the current matcher result for subsequent incoming requests for the amount of time that you specify in the
Try to match every ___ seconds per session
parameter.
Try to match every ___ seconds per session.
Specifies the amount of time that you want the Rule Engine to use the current matcher result for incoming requests. You must enable the Keep Matcher Result parameter to use the
Try to match every ___ seconds per session
parameter. Default is 3600 seconds.
Rule Action
Defines the action the Rule Engine applies to an SQL statement.
Processing Action
Defines how the Rule Engine processes the connection after the Rule Engine applies the security rule action.
Log When Rule is Applied
Creates an entry in the rule.log file if the Rule Engine applies the rule action to the request.

0 COMMENTS

We’d like to hear from you!