From 179a62782e7b490e8b309a04bd2213946af2f9ae Mon Sep 17 00:00:00 2001 From: naks1989 <119457923+naks1989@users.noreply.github.com> Date: Thu, 21 Nov 2024 16:04:22 -0500 Subject: [PATCH] Update exploit-prevention.md remove beta/preview tag. Exploit Prevention is in GA. Announcement email is going out tomorrow (Nov 22). --- .../application_security/threats/exploit-prevention.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/content/en/security/application_security/threats/exploit-prevention.md b/content/en/security/application_security/threats/exploit-prevention.md index f6d9880387e..c2cfd9b308d 100644 --- a/content/en/security/application_security/threats/exploit-prevention.md +++ b/content/en/security/application_security/threats/exploit-prevention.md @@ -14,8 +14,6 @@ further_reading: --- -
Exploit Prevention is in public Preview. See the library compatibility section for supported libraries.
- ## Overview Use ASM **Exploit Prevention** to protect your critical applications and APIs against zero-day vulnerabilities without tuning or reconfiguration. @@ -60,7 +58,7 @@ ASM Exploit Prevention intercepts all SQL queries to determine if a user paramet | SQL Injection (SQLi) | v3.4.0 | v2.16.0 | Avail. in Q4 '24 | v1.42.0 | v5.25.0, v4.49.0 | Avail. in Q4 '24 | | Command Injection | v3.2.0 | v2.11.0 | Avail. in Q4 '24 | not supported | v5.25.0, v4.49.0 | Avail. in Q4 '24 | -**Note**: Estimated availability of Exploit Prevention support for Ruby is Q4 '24. +**Note**: Estimated availability of Exploit Prevention support for Ruby is Q1 '25. ## Enabling Exploit Prevention