Forum Discussion

Jim_M's avatar
Jim_M
Icon for Cirrus rankCirrus
Sep 01, 2020

F5 ASM and Malicious sources?

The ASM regularly updates its attack signatures. Would those signatures include source IP addresses of known malicious actors? Or would those be sourced somewhere else within ASM?