<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WAF — GenAI Security Settings Configuration Guide in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/WAF-GenAI-Security-Settings-Configuration-Guide/m-p/275754#M399</link>
    <description>&lt;H1 class="text-text-100 mt-3 -mb-1 text-[1.375rem] font-bold"&gt;CloudGuard WAF — GenAI Security Settings Configuration Guide&lt;/H1&gt;
&lt;P&gt;More information on GenAI you will find in the &lt;A href="https://waf-doc.inext.checkpoint.com/additional-security-engines/genai-security" target="_self"&gt;Admin Guide&lt;/A&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;STRONG&gt;How to identify the Request URI and Prompt Location for GenAI attack inspection&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;This guide walks you through using Chrome Developer Tools to identify the correct Request URI and Prompt Location values needed to configure GenAI security scanning in Check Point CloudGuard WAF.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Overview&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;When configuring CloudGuard WAF to inspect GenAI-related traffic (such as prompts sent to an AI chatbot), you need to tell the WAF two things:&lt;/P&gt;
&lt;OL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-decimal flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Request URI&lt;/STRONG&gt; — The API endpoint path that handles chat/prompt requests (e.g., &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Prompt Location&lt;/STRONG&gt; — The JSON field inside the request body that contains the user's prompt (e.g., &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;body.message&lt;/CODE&gt;).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;The screenshot below shows the GenAI Security Settings panel in CloudGuard WAF where these values are entered.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 509px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34053i02BF6EB0AE119F51/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;To find the correct values for your application, follow the steps below using Chrome Developer Tools.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 1 — Open Chrome Developer Tools&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Open your web application in Google Chrome. Then open Developer Tools using one of the following methods:&lt;/P&gt;
&lt;UL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Press &lt;STRONG&gt;F12&lt;/STRONG&gt; on your keyboard, or&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Press &lt;STRONG&gt;Ctrl + Shift + I&lt;/STRONG&gt; (Windows/Linux) / &lt;STRONG&gt;Cmd + Option + I&lt;/STRONG&gt; (Mac), or&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Right-click anywhere on the page and select &lt;STRONG&gt;Inspect&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 2 — Go to the Network Tab and Add the Method and Path Columns&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;In the Developer Tools panel, click the &lt;STRONG&gt;Network&lt;/STRONG&gt; tab at the top. To make it easier to find the correct request, right-click on any column header (e.g., "Name") and enable the &lt;STRONG&gt;Method&lt;/STRONG&gt; and &lt;STRONG&gt;Path&lt;/STRONG&gt; columns. This will allow you to quickly spot the POST request and its URI path.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 3 — Send a Message in the Chat&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;With the Network tab open and recording, go back to your web application and type a message in the chat box (for example, type &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;hi&lt;/CODE&gt;). This will trigger an API call that you can inspect in the Network tab.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 4 — Locate the POST Request and Copy the Path (Request URI)&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;In the Network tab, look for the request with &lt;STRONG&gt;Method = POST&lt;/STRONG&gt;. The &lt;STRONG&gt;Path&lt;/STRONG&gt; column shows the Request URI. In the example below, the path is &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;. This is the value you will enter in the &lt;STRONG&gt;Request URI&lt;/STRONG&gt; field in the WAF GenAI settings.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 535px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34054i1005041F0577573E/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;You can also click on the request name (e.g., "chat") and verify the full URL in the &lt;STRONG&gt;Headers&lt;/STRONG&gt; tab. The screenshot below shows the Headers details confirming the Request URL and POST method.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 724px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34055i21D033DB8FB37A7A/image-dimensions/724x373?v=v2" width="724" height="373" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 5 — Click on the Payload Tab to Find the Prompt Location&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;After clicking on the POST request name in the Network tab, switch to the &lt;STRONG&gt;Payload&lt;/STRONG&gt; tab. This shows the JSON body that was sent with the request. Look for the field that contains the text you typed in the chat. In the example below, the message &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;hi&lt;/CODE&gt; appears in the &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;message&lt;/CODE&gt; field.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 551px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34056i755813A5EB172296/image-dimensions/551x145?v=v2" width="551" height="145" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorShay_Levin_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;The JSON field name that holds your text is the &lt;STRONG&gt;Prompt Location&lt;/STRONG&gt;. In this case, the prompt location is:&lt;/P&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg focus:outline-none focus-visible:ring-2 focus-visible:ring-accent-100" tabindex="0" role="group" aria-label="Code"&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;message&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BLOCKQUOTE class="ml-2 border-l-4 border-border-300/10 pl-4 text-text-300"&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;STRONG&gt;Tip:&lt;/STRONG&gt; If the JSON structure is nested (e.g., &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;{"data": {"prompt": "hi"}}&lt;/CODE&gt;), the prompt location would be &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;data.prompt&lt;/CODE&gt;. Use dot notation to describe the path to the field that contains the user's input.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 6 — Enter the Values in CloudGuard WAF&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Go back to the CloudGuard WAF portal and navigate to the GenAI Security Settings for your Web Application asset. Enter the values you identified:&lt;/P&gt;
&lt;UL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Request URI:&lt;/STRONG&gt; &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Prompt Location:&lt;/STRONG&gt; &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;message&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Click &lt;STRONG&gt;Save&lt;/STRONG&gt; to apply the configuration. The WAF will now inspect GenAI traffic on this endpoint for prompt injection attacks and other GenAI-specific threats.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Quick Reference&lt;/H2&gt;
&lt;DIV class="overflow-x-auto w-full px-2 mb-6"&gt;
&lt;TABLE class="min-w-full border-collapse text-sm leading-[1.7] whitespace-normal"&gt;
&lt;THEAD class="text-left"&gt;
&lt;TR&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Setting&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Where to Find It&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Example Value&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Request URI&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Network tab → Path column of the POST request&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;&lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Prompt Location&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Payload tab → JSON field containing your input&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;&lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;message&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 20 Apr 2026 09:18:42 GMT</pubDate>
    <dc:creator>Shay_Levin</dc:creator>
    <dc:date>2026-04-20T09:18:42Z</dc:date>
    <item>
      <title>WAF — GenAI Security Settings Configuration Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/WAF-GenAI-Security-Settings-Configuration-Guide/m-p/275754#M399</link>
      <description>&lt;H1 class="text-text-100 mt-3 -mb-1 text-[1.375rem] font-bold"&gt;CloudGuard WAF — GenAI Security Settings Configuration Guide&lt;/H1&gt;
&lt;P&gt;More information on GenAI you will find in the &lt;A href="https://waf-doc.inext.checkpoint.com/additional-security-engines/genai-security" target="_self"&gt;Admin Guide&lt;/A&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;STRONG&gt;How to identify the Request URI and Prompt Location for GenAI attack inspection&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;This guide walks you through using Chrome Developer Tools to identify the correct Request URI and Prompt Location values needed to configure GenAI security scanning in Check Point CloudGuard WAF.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Overview&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;When configuring CloudGuard WAF to inspect GenAI-related traffic (such as prompts sent to an AI chatbot), you need to tell the WAF two things:&lt;/P&gt;
&lt;OL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-decimal flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Request URI&lt;/STRONG&gt; — The API endpoint path that handles chat/prompt requests (e.g., &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Prompt Location&lt;/STRONG&gt; — The JSON field inside the request body that contains the user's prompt (e.g., &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;body.message&lt;/CODE&gt;).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;The screenshot below shows the GenAI Security Settings panel in CloudGuard WAF where these values are entered.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 509px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34053i02BF6EB0AE119F51/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;To find the correct values for your application, follow the steps below using Chrome Developer Tools.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 1 — Open Chrome Developer Tools&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Open your web application in Google Chrome. Then open Developer Tools using one of the following methods:&lt;/P&gt;
&lt;UL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Press &lt;STRONG&gt;F12&lt;/STRONG&gt; on your keyboard, or&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Press &lt;STRONG&gt;Ctrl + Shift + I&lt;/STRONG&gt; (Windows/Linux) / &lt;STRONG&gt;Cmd + Option + I&lt;/STRONG&gt; (Mac), or&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Right-click anywhere on the page and select &lt;STRONG&gt;Inspect&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 2 — Go to the Network Tab and Add the Method and Path Columns&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;In the Developer Tools panel, click the &lt;STRONG&gt;Network&lt;/STRONG&gt; tab at the top. To make it easier to find the correct request, right-click on any column header (e.g., "Name") and enable the &lt;STRONG&gt;Method&lt;/STRONG&gt; and &lt;STRONG&gt;Path&lt;/STRONG&gt; columns. This will allow you to quickly spot the POST request and its URI path.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 3 — Send a Message in the Chat&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;With the Network tab open and recording, go back to your web application and type a message in the chat box (for example, type &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;hi&lt;/CODE&gt;). This will trigger an API call that you can inspect in the Network tab.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 4 — Locate the POST Request and Copy the Path (Request URI)&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;In the Network tab, look for the request with &lt;STRONG&gt;Method = POST&lt;/STRONG&gt;. The &lt;STRONG&gt;Path&lt;/STRONG&gt; column shows the Request URI. In the example below, the path is &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;. This is the value you will enter in the &lt;STRONG&gt;Request URI&lt;/STRONG&gt; field in the WAF GenAI settings.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 535px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34054i1005041F0577573E/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;You can also click on the request name (e.g., "chat") and verify the full URL in the &lt;STRONG&gt;Headers&lt;/STRONG&gt; tab. The screenshot below shows the Headers details confirming the Request URL and POST method.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 724px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34055i21D033DB8FB37A7A/image-dimensions/724x373?v=v2" width="724" height="373" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 5 — Click on the Payload Tab to Find the Prompt Location&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;After clicking on the POST request name in the Network tab, switch to the &lt;STRONG&gt;Payload&lt;/STRONG&gt; tab. This shows the JSON body that was sent with the request. Look for the field that contains the text you typed in the chat. In the example below, the message &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;hi&lt;/CODE&gt; appears in the &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;message&lt;/CODE&gt; field.&lt;/P&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 551px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34056i755813A5EB172296/image-dimensions/551x145?v=v2" width="551" height="145" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorShay_Levin_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;The JSON field name that holds your text is the &lt;STRONG&gt;Prompt Location&lt;/STRONG&gt;. In this case, the prompt location is:&lt;/P&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg focus:outline-none focus-visible:ring-2 focus-visible:ring-accent-100" tabindex="0" role="group" aria-label="Code"&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;message&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BLOCKQUOTE class="ml-2 border-l-4 border-border-300/10 pl-4 text-text-300"&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;&lt;STRONG&gt;Tip:&lt;/STRONG&gt; If the JSON structure is nested (e.g., &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;{"data": {"prompt": "hi"}}&lt;/CODE&gt;), the prompt location would be &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;data.prompt&lt;/CODE&gt;. Use dot notation to describe the path to the field that contains the user's input.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Step 6 — Enter the Values in CloudGuard WAF&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Go back to the CloudGuard WAF portal and navigate to the GenAI Security Settings for your Web Application asset. Enter the values you identified:&lt;/P&gt;
&lt;UL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Request URI:&lt;/STRONG&gt; &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Prompt Location:&lt;/STRONG&gt; &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;message&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Click &lt;STRONG&gt;Save&lt;/STRONG&gt; to apply the configuration. The WAF will now inspect GenAI traffic on this endpoint for prompt injection attacks and other GenAI-specific threats.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Quick Reference&lt;/H2&gt;
&lt;DIV class="overflow-x-auto w-full px-2 mb-6"&gt;
&lt;TABLE class="min-w-full border-collapse text-sm leading-[1.7] whitespace-normal"&gt;
&lt;THEAD class="text-left"&gt;
&lt;TR&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Setting&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Where to Find It&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Example Value&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Request URI&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Network tab → Path column of the POST request&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;&lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;/api/chat&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Prompt Location&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Payload tab → JSON field containing your input&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;&lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;message&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Apr 2026 09:18:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/WAF-GenAI-Security-Settings-Configuration-Guide/m-p/275754#M399</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2026-04-20T09:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: WAF — GenAI Security Settings Configuration Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/WAF-GenAI-Security-Settings-Configuration-Guide/m-p/275755#M400</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/12733"&gt;@Shay_Levin&lt;/a&gt;&amp;nbsp;very interesting&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 09:35:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/WAF-GenAI-Security-Settings-Configuration-Guide/m-p/275755#M400</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-04-20T09:35:10Z</dc:date>
    </item>
  </channel>
</rss>

