Naming protection is used to prevent the creation of directories or files with specified names, such as blocking PHP files in the uploads directory to stop hackers from uploading web shell files.
Friendly Reminder: The system will not modify or delete any existing files—it only blocks new creations.
1. Protected Directory
Enter the directory to protect (e.g., d:\wwwroot\*).
Note: Only directories can be specified!
2. Block Directorys
Specify directory names to block.
Supports full or partial names (use * for wildcards).
Entering * alone blocks all new directory creations.
Examples:
upload Blocks creation of directories named upload.
web* Blocks directories starting with web (e.g., webdata, web_backup).
*.php Blocks directories ending with .php (e.g., malicious.php).
*upload* Blocks directories containing upload (e.g., upload, myuploads).
3. Block Files
Specify file names to block.
Supports full or partial names (use * for wildcards).
Entering * alone blocks all new file creations.
Examples:
web.config Blocks creation of files named web.config.
web* Blocks files starting with web (e.g., web.txt, web_backup.zip).
*.php Blocks files ending with .php (i.e., PHP files).
*.asp* Blocks files containing .asp (e.g., 1.asp, 1.aspx, malicious.asp.txt).
4. Block Bad Files
Malformed files/directories are those that cannot be created, viewed, or deleted via normal operations, often crafted by attackers.
Note: This feature is only available on Windows.
