Data that define the available infection rules are described below:
Data | Description | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Enabled |
If selected, the rule will be sent to the Network Injector. If not selected, the rule is saved but not sent. |
||||||||||||||||||||||||
Disable on sync |
If selected, the rule is disabled after the first synchronization of the agent defined in the rule. If not selected, the Network Injector continues to apply the rule, even after the first synchronization. |
||||||||||||||||||||||||
Probability |
Probability (in percent) of applying the rule after the first infected resource. 0%: after infecting the first resource, Network Injector will no longer apply this rule. 100%: after infecting the first resource, Network Injector will always apply this rule. Tip: if a value over 50% is selected, we recommend you use the Disable on sync option. |
||||||||||||||||||||||||
Target |
Name of the target to be infected. |
||||||||||||||||||||||||
Ident |
Target's HTTP connection identification method. NOTE: Network Injector cannot monitor FTP or HTTPS connections. Each method is described below:
|
||||||||||||||||||||||||
Pattern |
Target's traffic identification method. The format depends on the type ofIdent selected.
|
||||||||||||||||||||||||
Action |
Infection method that will be applied to the resource indicated in Resource pattern:
|
||||||||||||||||||||||||
Resource Pattern |
Identification method of the resource to be injected, applied to the Web re source URL. The format depends on the type of Action selected.
|
||||||||||||||||||||||||
Factory |
For all actions except REPLACE. Agent to be injected into the selected Web resource. |
||||||||||||||||||||||||
File |
For REPLACE Action only. File to be replaced with the one indicated in Resource pattern. |
RCS9.4 | User's Guide | © COPYRIGHT 2014