The security analytics dashboard provides you visualized analysis of HTTP(S) request traffic via Web Application Firewall (WAF) and bot management. You can create protection rules based on applied filters or make informed adjustments to the existing rules.
What can you do with security analytics
With the visualized analysis, you can verify the compliance of request characteristics against valid request baselines, which include but not limited to the header structure, load mode, and access frequency.
If the traffic deviates from the established baselines, it may signal a potential security threat, such as SQL injection and HTTP flood attack. In such cases, further analysis or intervention is required to mitigate the risk. ESA WAF rules can be used to precisely block requests and trace attacks. This allows for proactive threat handling in a robust security setup.
Check on the dashboard
In the ESA console, choose Websites and click the website name you want to manage.
In the left-side navigation pane, choose .
Filter your data by time and other query characteristics.
NoteThe retrieved data has an approximate delay of 5 minutes.
Optional. You can click the
icon to print the report or the
icon to download it.
Optional. Click Create Custom WAF Rule from Filters to create a custom rule based on your applied filters.
Security analytics panels
You can see a top data panel and an overview panel.
Top data panels
You can filter the data to view the top five or all results in an available dimension:
The available dimensions are:
Overview panel
On the Overview panel:
The Request Analytics tab is an interactive chart that displays the same dimensions as the top data panel.
The Bot Analytics tabs is an interactive chart that displays incoming requests categorized into Likely Human, Definite Bots, Likely Bots, or Verified Bots.
In both charts, you can move your mouse pointer over a dimension name and click Filter or Exclude to filter out or exclude data from your analytics report.
Sampling logs
Sampling logs are generated through adaptive sampling of your incoming HTTP(S) traffic. You can use filters to narrow down the query results. Click for more information.
The example shows an expended log entry for Definite Bots.