Forum Discussion
MSZ
Nimbostratus
Sep 09, 2015How to start with F5 BIG-IP ASM quickly?
I would like to know the quick overview of the functions under:
Security --> Event Logs
Security --> Reporting
And on the basis of Event logs, how we can tune the ASM?
boneyard
MVP
Sep 15, 2015im not sure i understand you correctly. what do you mean with tuning? blocked request can be good ones because an attack takes place, but they can also be bad ones because a valid request is blocked.
tuning a policy in my opinion means trying to get rid of the false positives. but you say somewhere else "If event logs show: Blocked, Illegal and truncated requests, then it means our applications are secure and we need to see the violations only."
that isn't really the case, violations result in a block event if the policy is configured like that.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects