All Products
Search
Document Center

Web Application Firewall:Configure a whitelist for web intrusion prevention

Last Updated:Mar 31, 2026

Web intrusion prevention blocks common web attacks and zero-day vulnerabilities, but strict detection rules can sometimes flag legitimate traffic as malicious. For example, an internal tool that sends requests containing special characters in authorization headers might be blocked even though it is authorized. Configure a whitelist to exempt specific requests from detection by the Protection Rules Engine.

Prerequisites

Before you begin, ensure that you have:

  • A WAF instance

  • A website added to WAF — see Tutorial

Create a whitelist rule

Step 1: Open the whitelist page

  1. Log on to the WAF console.

  2. In the top navigation bar, select the resource group and the region where your WAF instance is deployed. The available regions are Chinese Mainland and Outside Chinese Mainland.

  3. In the left-side navigation pane, choose Protection Configurations > Website Protection.

  4. At the top of the Website Protection page, select the domain name from the Switch Domain Name drop-down list.切换域名

  5. Click the Web Security tab, locate the Web Intrusion Prevention section, and click Settings.

  6. On the Web Intrusion Prevention - Whitelisting page, click Create Rule.

Step 2: Configure the rule

In the Create Rule dialog box, configure the following parameters.web入侵防护白名单

ParameterDescription
Rule nameA name for the rule. Accepts 1–50 characters containing letters and digits.
Matching ConditionThe conditions that identify which requests to exempt. Click Add rule to add conditions — up to 5 per rule. When multiple conditions are set, the rule triggers only if all conditions are met. For supported fields, see Fields in match conditions.
Bypassed ModulesThe protection module to bypass for matching requests. The only valid value is Protection Rules Engine.

Step 3: Select the scope of rules to bypass

When you select Protection Rules Engine, All Rules is automatically selected — every rule in the engine is bypassed for matching requests.

Important

Configure the narrowest bypass scope possible to minimize your attack surface. Prefer skipping specific rule IDs over skipping all rules or entire rule types.

Option A: Skip specific rules by ID (recommended)

  1. Select IDs of Specific Rules.

  2. Enter each rule ID and press Enter after each one. You can enter up to 50 rule IDs.特定规则ID

To find rule IDs, go to the Protection Rule Group page and click Create Rule Group — the page lists all rules in WAF with their IDs. For more information, see Customize protection rule groups.

Tip: To handle a specific false positive faster, go to the Security Report page, open the Web Intrusion Prevention tab, find the blocked request, and click Ignore False Positives in the Actions column. WAF automatically generates a whitelist rule based on the characteristics of attack requests — you do not need to manually configure conditions or query rule IDs. For details, see View security reports on the Web Security tab.

Option B: Skip specific rule types

  1. Select Specific Types of Rules.

  2. Select the rule types to bypass.

  3. Click Confirm.特定规则类型

Step 4: Save the rule

Click Save.

The whitelist rule is automatically enabled. View, disable, edit, or delete rules at any time from the rule list.

Important

Whitelist rules do not expire. If a rule is no longer needed, disable or delete it to avoid leaving unintended gaps in protection.

What's next