-
Low-touch onboarding of Citrix ADC instances using Citrix ADM service connect
-
-
Importing and synchronizing StyleBooks from GitHub repository
-
-
-
-
Use ADM audit logs for managing and monitoring your infrastructure
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已动态机器翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
This content has been machine translated dynamically.
This content has been machine translated dynamically.
This content has been machine translated dynamically.
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.
Este artigo foi traduzido automaticamente.
这篇文章已经过机器翻译.放弃
Translation failed!
WAF violation details
Note
You can also view the traffic pattern analytics, even if no violations are observed. For more information, see Behavior checks with no violations
Unusually High Upload Transactions
Note
Ensure you enable the advanced security analytics and web transaction options. For more information, see Setting up.
Using the Unusually High Upload Transactions indicator, you can analyze the transactions with the unusually high amount of data uploaded to the Citrix ADC instance.
Under Event Details, you can view:
-
The affected application. You can also select the application from the list if two or more applications are affected with violations.
-
The graph indicating all violations
-
The violation occurrence time
-
The detection message for the violation, indicating the total uploads that exceeded the configured limit
-
The anomalous uploads. Click the number to view details
Unusually High Download Transactions
Note
Ensure you enable the advanced security analytics and web transaction options. For more information, see Setting up.
Using the Unusually High Download Transactions indicator, you can analyze the transactions with the unusually high amount of downloaded data from the Citrix ADC instance.
Under Event Details, you can view:
-
The affected application. You can also select the application from the list if two or more applications are affected with violations.
-
The graph indicating all violations
-
The violation occurrence time
-
The detection message for the violation, indicating the total downloads that exceeded the configured limit
-
The anomalous downloads. Click the number to view details
Excessive Unique IPs
Note
Ensure you enable the advanced security analytics and web transaction options. For more information, see Setting up.
Using the Excessive Unique IPs indicator, you can analyze if the Citrix ADC instance is transacting with the abnormally high number of IP addresses.
Under Event Details, you can view:
-
The affected application. You can also select the application from the list if two or more applications are affected with violations.
-
The graph indicating all violations
-
The violation occurrence time
-
The detection message for the violation, indicating the total unique IP addresses transacting than the expected range
-
The accepted range of unique IP addresses
Excessive Unique IPs per Geo
Note
Ensure you enable the advanced security analytics and web transaction options. For more information, see Setting up.
Bad bots are capable of making more visits to a web application than the human users accessing the application. This activity from the bad bots can result in slow performance of the web application or any other performance issues. As an administrator, you must analyze and block the bad bots accessing the web application.
Using the Excessive Unique IPs Per Geo indicator, you can analyze the unusually high number of IPs accessing the application from a particular location.
Under Event Details, you can view:
-
The affected application. You can also select the application from the list if two or more applications are affected with this violation.
-
The Geo map that displays the total anomalies based on the regions.
-
The location and total unique hits from where the application is accessed. You can also select the location from the list, if the application is accessed from two or more locations.
-
The graph indicating the violations.
-
The violation occurrence time.
-
The detection message for the violation, indicating the total unique IP addresses transacting than the expected range.
-
The accepted range of unique IP addresses.
Share
Share
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select Do Not Agree to exit.