Forum Discussion
rob_carr
Aug 13, 2013Cirrostratus
Provided you have all of the traffic handling elements created, configuring the ASM to protect your application from SQL Injection is really just a matter of making sure that you have the correct attack signature set assigned (which flavor of SQL do you need to protect? MS-SQL or MySQL for example) to your security policy.
You'll need to look a the different methods for creating security policies to see which one works best for your environment.