diff --git a/Reference-Manual-(v3.x).mediawiki b/Reference-Manual-(v3.x).mediawiki
index 50c2c7b..b8320e5 100644
--- a/Reference-Manual-(v3.x).mediawiki
+++ b/Reference-Manual-(v3.x).mediawiki
@@ -1164,36 +1164,7 @@ SecRule REQUEST_URI|ARGS_NAMES|ARGS|XML:/* "[\;\|\`]\W*?\bmail\b" \
'''Not supported in v3'''
== SecStatusEngine ==
-'''Description:''' Controls Status Reporting functionality. Uses DNS-based reporting to send software version information to the ModSecurity Project team.
-
-'''Syntax:''' SecStatusEngine On|Off
-
-'''Example Usage:''' SecStatusEngine On
-
-'''Scope:''' Any
-
-'''Version:''' 2.8.0-2.9.x
-
-'''Supported on libModSecurity:''' TBI
-
-'''Default:''' Off
-
-If SecStatusEngine directive is not present, it is disabled. If SecStatusEngine is marked as On, the following information will be shared with the ModSecurity project team when the web server is started:
-
-* Anonymous unique id for the server
-* Version of:
-** ModSecurity
-** Web Server Software (Apache, IIS, Nginx, Java)
-** APR
-** Libxml2
-** Lua
-** PCRE
-
-; Note : This is an example of the information presented in the Apache error_log representing what data will be sent:
-
-[Mon Jan 20 10:55:22.001020 2014] [:notice] [pid 18231:tid 140735189168512] ModSecurity: StatusEngine call: "2.7.7,Apache/2.4.4 (Unix),1.4.6/1.4.6, 8.32 /8.32 2012-11-30,Lua 5.1/(null),2.7.8/(null),96ce9ba3c2fb71f7a8bb92a88d560d44dbe459b8" -[Mon Jan 20 10:55:22.089012 2014] [:notice] [pid 18231:tid 140735189168512] ModSecurity: StatusEngine call successfully submitted. -+'''Not supported in v3''' == SecStreamInBodyInspection == '''Not supported in v3''' @@ -1204,9 +1175,7 @@ If SecStatusEngine directive is not present, it is disabled. If SecStatusEngine == SecTmpDir == '''Not supported in v3''' -The location specified needs to be writable by the Apache user process. This is the directory location where ModSecurity will swap data to disk if it runs out of memory (more data than what was specified in the SecRequestBodyInMemoryLimit directive) during inspection. - -As of ModSecurity version 3.0, SecTmpDir is no longer supported. libModSecurity is able to deal with request body in a file or in a buffer (chunked or not). Web servers have properties which controls whenever a request should be saved to a file or used as a buffer (e.g. client_body_buffer_size https://nginx.org/en/docs/http/ngx_http_core_module.html#client_body_buffer_size) . If it is a file, ModSecurity will use the file to perform the inspection. If not, the buffer will be used. +libModSecurity is able to deal with request body in a file or in a buffer (chunked or not). Web servers have properties which controls whenever a request should be saved to a file or used as a buffer (e.g. client_body_buffer_size https://nginx.org/en/docs/http/ngx_http_core_module.html#client_body_buffer_size) . If it is a file, ModSecurity will use the file to perform the inspection. If not, the buffer will be used. == SecUnicodeMapFile == '''Description:''' Defines the path to the file that will be used by the urlDecodeUni transformation function to map Unicode code points during normalization and specifies the Code Point to use.