This section describes how to mask false alarms and view event details if you find out that an event is misreported.
Parameter |
Description |
---|---|
Event Type |
Type of an attack By default, All is selected. You can view logs of all attack types or select an attack type to view target attack logs. |
Source IP Address |
Public IP address of the web visitor/attacker By default, All is selected. You can view logs of all attack source IP addresses, select an attack source IP address, or enter an attack source IP address to view target attack logs. |
Parameter |
Description |
---|---|
Time |
Time when an attack occurs |
Source IP Address |
Public IP address of the web visitor/attacker |
Domain Name |
Attacked domain name |
URL |
Attacked URL |
Malicious load |
Location of the malicious load |
Event Type |
Type of an attack |
Protective Action |
Protective actions. The options are Block, Log only, Allow, Verification code, Filter, and Mismatch. |
To view event details, click Details in the Operation column of the event list.
False alarm masking only applies to events logged by built-in basic web protection rules. If you want to mask events logged by custom rules, delete the rules.
Parameter |
Description |
Example Value |
---|---|---|
Domain Name |
Domain name where an attack occurs, which is obtained automatically by the system |
-- |
Path |
Misreported URL excluding a domain name
NOTE:
|
/admin* |
Event ID |
ID of a built-in rule, which is automatically read. The value consists of six digits. |
223604 |
You can switch to the Domains page, locate the row containing the target domain name, click Configure Policy in the Operation column. In the False Alarm Masking area, and click Customize Rule to view the added false alarm rule.