Match Finder
Last updated
Was this helpful?
Last updated
Was this helpful?
It Identifies, stores all the rules matched by WAF, and generates match finder details for a specific or all listener so that you can identify all matched, rules for the listener by listing the events.
1. Go to WAF > Match Finder
2. Click on the Run Query button on the top right side.
Displays the event ID logged for the certain request found to be malicious.
Displays all matched rule id for the query.
Displays the matching URI for the current event.
Displays the zone/sub-domain name that belongs to it.
Displays the payload matched for the current event.
It specifies the action to be taken. To whitelist current event rules, click on the Whitelist button.
We can further download all events matched based on the filter from the event page.