Managing Threats
Matched Threats
The Matched Threats table provides data for each threat that matched the rule.
The table lists the other rules that were matched by the threat:
-
Clicking a rule name in the Rules column displays that rule’s activity page.
-
Hovering over a rule in the Rules column also highlights all instances of the same rule in the other rows.
-
Clicking a rule in the Description column displays the properties for that rule.
-
The Match Events column shows the number of times traffic matched a rule within the selected time range and its change over time. A significant value could indicate a security problem.
You can drill into each threat to display its Entity Details page.
Activity
The Activity table lists each attack and the time it occurred. You can drill into each threat to display its Entity Details page.
If you are unfamiliar with the Status icons, you can hover over the icon in the Status column to see its activity.
Managing threats
If your account has sufficient permissions, you can manually allow, block or deny entitie from the threat’s Entity Details page, IWAF Settings page, or by using the ThreatX API.
Entity Details
If the threat has interacted with your sites, you can add them to the list: . Click the threat in the Dashboard or other location to open its Entity Details page. . Click Current Status . Change it to the desired list.
To remove a threat from a list, open Current Status and select a different list or Watched.
IWAF Settings
-
In each tab, use Add Entry to add an IP address or CIDR range to the list. You are prompted to provide a reason for the action.
-
Use the Remove in the entity’s row to manually remove an entity.