All Products
Search
Document Center

Web Application Firewall:Overview

Last Updated:Mar 31, 2026

The Overview page is your security monitoring dashboard for WAF. Use it to:

  • Review traffic volume, queries per second (QPS), and bandwidth trends for the past 30 days

  • Track how many requests each protection module has intercepted

  • Investigate urgent vulnerability notifications and see which domain names are affected

  • Analyze threat events by attack source, type, and tool

The Overview page shows aggregated statistics and trend data. For log-level attack details, go to Security Report (per-module summaries) or Log Service (raw logs) after you identify a threat here.

Prerequisites

Before you begin, ensure that you have:

Query data on the Overview page

When you log in to the WAF console, you are directed to an interface based on where your WAF instance is deployed: instances in the Chinese mainland open in the China (Hangzhou) region, and instances outside the Chinese mainland open in the Singapore region.

  1. Log in to the WAF console. In the top navigation bar, select the resource group and the region (Chinese Mainland or Outside Chinese Mainland) where your WAF instance is deployed.

  2. In the left-side navigation pane, click Overview.

  3. At the top of the Overview page, set a domain name filter and a time range.

    SettingDefaultOptions
    Domain nameAll (data for all domain names added to WAF)Select a specific domain name
    Time rangeTodayIntervals: 10 seconds, 30 seconds, 60 seconds, 5 minutes. Presets: Yesterday, Today, 7 Days, 30 Days

The Overview page has four sections:

Urgent vulnerabilities

The Urgent Vulnerability section displays updated WAF protection rules for the most recent security vulnerabilities disclosed on the Internet.

Click a rule to open the Details panel. The panel shows:

  • Domain names affected by the vulnerability

  • Vulnerability details

  • Information about the protection rules

Protection result statistics

This section shows the total number of requests WAF received and the number of requests that triggered each protection module: Web Intrusion Prevention, HTTP Flood Protection, Scan Protection, Access Control, and Blocked Bot Attacks.

Click the number below a module to go to the Security Report page and view detailed attack information. For more information, see View security reports.

Click the 展开 icon below the statistics to expand detailed data:

  • All domain names: the top 5 domain names for each module are displayed.

  • A specific domain name: a trend chart for the statistical data is displayed.

Request analysis charts

Request trend charts

The trend charts show traffic data across four tabs: Requests, QPS, Bandwidth, and Response Code. Time granularity is accurate to the second, so you can monitor real-time traffic at second-level resolution.

Click a tab to switch the trend chart. Click a legend item below the chart to show or hide that module's trend line.

Requests

Shows total requests alongside the number of requests that triggered Web Intrusion Prevention, HTTP Flood Protection, Scan Protection, Access Control, and Bot Management.

QPS

Shows queries per second (QPS) for all requests, QPS for web intrusion prevention, QPS for HTTP flood protection, QPS for scan protection, QPS for access control, and QPS for blocked bot attacks.

In the upper-right corner of the chart, toggle between Average and Peak QPS.

Bandwidth

Shows inbound and outbound bandwidth trends.

Response Code

Shows error codes returned to clients and error codes returned to WAF. Error codes tracked include 5XX, 405, 499, 302, and 444.

In the upper-right corner, toggle between WAF to Client and Origin Server to WAF.

Traffic analysis

客户端类型分布

The Traffic Analysis section breaks down traffic into two views:

Percentage of bot traffic

Shows the split between human traffic (from browsers and applications) and bot traffic (from all other client types) for the selected domain name.

If bot traffic is abnormally high, click Configure Policy to set up Bot Management rules. After configuring, click View Trend to open the Bot Management tab in Security Report and check protection effectiveness. For more information, see Configure anti-crawler rules for websites.

Client type distribution

Shows the distribution of client types in a pie chart. Common types include browsers, script tools, search engines, and scanners.

Click the question mark icon icon next to Traffic Analysis to see descriptions of each client type. Click a slice in the pie chart to drill down into the subtype distribution for that client type.

Request analysis ranking charts

The ranking charts display the top 10 results across three tabs:

  • Top 10 Clients: client types that initiated the most requests

  • URL Requests: URLs that received the most requests

  • Top IP: source IP addresses of the most requests

Threat event analysis

The Threat Event Analysis section shows attack events on your website and the attacks blocked by WAF.

Click an event name to open the event details panel, which includes threat intelligence and handling suggestions. The Top 5 Attacks sub-section lets you pivot the data across five dimensions:

TabWhat it shows
Source IP AddressTop 5 source IP addresses of attacks
TargetTop 5 URLs that received the most attacks
Attack TypeTop 5 attack types (for example, SQL injection, cross-site scripting (XSS))
Attack DateTop 5 dates with the most attacks
Attack ToolTop 5 tools used in attacks (for example, cURL, postman-runtime)

To investigate an event in depth, click View Log next to the event name to open Log Service and query the raw logs. For more information, see Query logs.

What's next

  • Respond to a flagged threat event: use the Top 5 Attacks tabs to identify the attack source, then create or adjust a protection rule in Access Control or Bot Management.

  • Investigate bot traffic anomalies: click Configure Policy in the Percentage of Bot Traffic section.

  • Review detailed attack logs: navigate to Security Report or Log Service.