What it does: Creates a new Admin Tools WAF deny rule.
Syntax: admintools:wafdeny:add --application=APPLICATION [--component=COMPONENT] [--view=VIEW] [--task=TASK] [--query=QUERY] --query_type=QUERY_TYPE [--query_content=QUERY_CONTENT] [--verb=VERB] [--enabled=ENABLED] [--format=FORMAT]
Arguments
This command takes no arguments.
Options
Application side where the rule should be applied. One of site, administrator
Component name where the rule should be applied, e.g. com_foobar. Skip to apply to all components.
View name where the rule should be applied. Skip to apply to all views.
Task where the rule should be applied. Skip to apply to all tasks.
Request query parameter name where the rule should be applied. Skip to apply to all request parameters.
Match type for the query_content. E for exact match, P for partial match, R for regular expression
The content of the query, matched using the query_type, to trigger this rule.
HTTP verb to apply the rule to. One of GET, POST, PUT, HEAD, DELETE, OPTIONS, TRACE. Skip to apply to all HTTP verbs.
Should the rule be enabled? 0 or 1. Default (if skipped) is 1 (enabled).