Handle False Positives

Learn how to identify, analyze, and minimize false positives in the Web Application Firewall (WAF) to ensure accurate protection without disrupting legitimate traffic.

A false positive occurs when the WAF blocks or flags a legitimate request as malicious. This can happen due to aggressive rule patterns or incomplete exceptions. Proper handling of false positives helps maintain both security and availability of your applications.

False positives are common during initial WAF configuration. Always start in Monitoring Only mode to observe behavior before activating full protection.

1

Identify False Positives

Use WAF logs and analytics to locate requests that were incorrectly blocked or flagged.

  1. Open the Medianova Control Panel.

  2. Go to Analytics → WAF Dashboard.

  3. Review blocked requests and event logs.

  4. Look for requests that match normal user or API behavior but are classified as threats.

Pay special attention to repetitive blocks from trusted IPs or common API endpoints — they are typical indicators of false positives.

2

Analyze Rule Behavior

Determine which rule caused the false detection. You can identify the Rule ID or Rule Name responsible by inspecting the event details in the WAF dashboard.

Common Cause
Example

Overly broad request URI match

Blocking /api/v1/ instead of /api/v1/admin

Strict User Agent filtering

Blocking “curl” used in automated internal scripts

Missing whitelist entry

Internal monitoring IPs not excluded

Outdated rule condition

Old regex pattern still matching new endpoint

Custom Rules take precedence over Managed Rules. If both apply, the Custom Rule’s action will execute.

3

Adjust Rules or Add Exceptions

After identifying the cause, fine-tune your rules to allow legitimate traffic while keeping protection active.

You can:

  • Modify an existing rule

    • Adjust the Field, Operator, or Value for more precise matching.

    • Example: Change “contains /api” to “equals /api/admin”.

  • Change the rule action

    • Temporarily switch from Block to Log Only to monitor.

  • Add an exception rule

    • Allow requests from a specific IP, URI, or User Agent.

  • Whitelist internal services

    • Add known internal IPs (monitoring tools, API clients) to an allowlist.

Apply changes incrementally and review logs after each update to confirm resolution.

4

Validate After Adjustments

Once changes are made, monitor the WAF dashboard again:

  1. Keep the affected rule in Log Only mode for several hours or days.

  2. Check if the same requests are still flagged.

  3. If no false alerts occur, switch the rule back to Block mode.

Do not disable Managed Rules globally to avoid temporary false positives. Always isolate and fix the specific rule causing the issue.

Last updated

Was this helpful?