Forum Discussion
amolari
Aug 31, 2018Cirrus
With remote logging, you can also configure requests type of
Illegal requests, and requests that include staged attack signatures
.
In the available item lists, you'll see
- staged_sig_ids
- staged_sig_names
- staged_sig_set_names