FP Finder
Last updated
Was this helpful?
Last updated
Was this helpful?
It Identifies, stores all the rules matched by WAF, and generates False-Positive details for a specific listener so that you can identify the actual false positive generated.
1. Go to WAF > FP Finder
2. Click on the Run Query button on the top right side.
Displays the rules for which False Positive is generated.
Displays all matched URLs for the query.
Displays the payload matched for the query like Event Id, Variable, Content, Attack Type, Action.
We can further download all events matched based on the filter from the event page.