This article explains the legacy version of
All threats detected by Web Application Firewall will be logged. Logged threats may be viewed from the Web Application Firewall dashboard.
Standard security practices dictate that measures should be taken to prevent sensitive data (e.g., credit card information or passwords) from being passed as clear text from the client to your origin server. Another incentive for encrypting sensitive data is that it will be logged by our system when an alert is triggered as a result of this data. If sensitive data cannot be encrypted or obfuscated, then it is strongly recommended to contact our technical customer support to disable logging for the Matched Value field.
An instance configuration determines whether any of the following additional actions will be applied to the detected threat.
Mode | Description |
---|---|
Block Request |
Detected threats will be dropped and the client will receive a 403 Forbidden response. |
Alert Only |
Detected threats will only generate an alert. Use this mode to track detected threats through the dashboard without affecting traffic. |
Redirect (HTTP 302) |
Detected threats will be redirected to the specified URL. Key information:
|
Custom Response |
Detected threats will receive a custom response. Define the custom response that will be sent in response to a detected threat.
|
A custom response header value or a custom response body may include variables that describe the event. These variables are described below.
Variable | Description |
---|---|
EVENT_ID |
Represents the system-defined ID assigned to the request that was identified as a threat. Find out detailed information about the detected threat by passing this ID to the Get Event Log Entry endpoint (REST API). |
CLIENT_IP |
Represents the IP address of the device that submitted the detected threat. |
TIMESTAMP |
Represents the date and time at which the detected threat was submitted. |
REQUEST_URL |
Represents the URL for the request that was deemed a threat. |
Add an event variable to a custom response header value or a custom response body by enclosing it with double curly braces as shown below.
Syntax:
Example: