All Violations 编辑

All Violations

The All Violations page displays the application security violation details based on the Network, WAF, and Bot categories. To view the security violations in Citrix ADM, ensure:

  • You have a premium license for the Citrix ADC instance (for WAF and BOT violations).

  • You have applied license on the load balancing or content switching virtual servers (for WAF and BOT). For more information, see Manage licensing on virtual servers.

  • You enable more settings. For more information, see the procedure available at Setting up.

Violation categories

Citrix ADM enables you to view the following violations. Under Violation Details, you can click each violation tab to view the violation details.

NetworkWAFBot
HTTP Slow LorisUnusually High Upload TransactionsExcessive Client Connections
DNS Slow LorisUnusually High Download TransactionsAccount Takeover
HTTP Slow PostExcessive Unique IPsUnusually High Upload Volume
NXDomain Flood AttackExcessive Unique IPs Per GeoUnusually High Request Rate
HTTP desync attackSuspicious sign-up attemptsUnusually High Download Volume
Bleichenbacher AttackInfer Content Type XMLWebsite Scanners
Segment smack AttackBuffer OverflowAccount Takeover for Citrix Gateway
SYN Flood AttackContent TypeAPI Abuse
Small Window AttackCookie ConsistencyContent Scapers
 CSRF Form TaggingKeystroke and mouse dynamics based bot detection
 Deny URLScraper
 Form Field ConsistencyScreenshot Creator
 Field FormatsSearch Engine
 Maximum UploadsService Agent
 Referrer HeaderSite Monitor
 Safe CommerceSpeed Tester
 Safe ObjectTool
 HTML SQL InjectUncategorized
 Start URLVirus Scanner
 Cross-site scriptingVulnerability Scanner
 XML DoSDeviceFP Wait Exceeded
 XML FormatInvalid DeviceFP
 XML WSIInvalid Captcha Response
 XML SSLCaptcha Attempts Exceeded
 XML AttachmentValid Captcha Response
 XML SOAP FaultCaptcha Client Muted
 XML ValidationCaptcha Wait Time Exceeded
 OthersRequest Size Limit Exceeded
 IP ReputationRate Limit Exceeded
 HTTP DOSBlock list (IP, subnet, policy expression)
 TCP Small WindowAllow list (IP, subnet, policy expression)
 Signature ViolationZero Pixel Request
 File Upload TypeSource IP
 JSON cross-site scriptingHost
 JSON SQLGeo Location
 JSON DOSURL
 Command InjectionCrawler
 Cookie HijackFeed Fetcher
 Block KeywordLink Checker
 JSON Block KeywordMarketing
 Command Injection Grammar 
 JSON SQL Injection Grammar 

Note

To view the Account Takeover, Website Scanners, and Content Scrapers violations, you must configure the settings in Citrix ADM. See the prerequisite mentioned in the violation details page.

Security violations dashboard

In the security violations dashboard, you can view:

  • Total violations occurred across all ADC instances and applications. The total violations are displayed based on the selected time duration.

    Total violations

  • Total violations under each category.

    Total violations

  • Total ADCs affected, total applications affected, and top violations based on the total occurrences and the affected applications.

    Affected violations

Violation details

For each violation, Citrix ADM monitors the behavior for a specific time duration and detects violations for unusual behaviors. Click each tab to view the violation details. You can view details such as:

  • The total occurrences, last occurred, and total applications affected

  • Under event details, you can view:

    • The affected application. You can also select the application from the list if two or more applications are affected with violations.

    • The graph indicating violations.

      Drag and select on the graph that lists the violations to narrow down the violation search.

      Drag and select on graphSearch result
      Drag and selectSearch result

      Click Reset Zoom to reset the zoom result.

    • Recommended Actions that suggest you troubleshoot the issue.

    • Other violation details such as violence occurrence time and detection message.

Behavior checks with no violations

Apart from violation details, you can visualize a 3-week traffic prediction based on the machine learning algorithm. As an administrator, this 3-week prediction enables you to:

  • Analyze the traffic pattern even if no violations are observed.

  • Take troubleshooting actions for any unusual traffic patterns observed from the predictions.

  • Observe that Citrix ADM is processing data, apart from the anomalies.

In the Security Violations page, click the Behavior checks with no violation tab to view the 3-week traffic prediction.

No violation

The security violations are displayed. Consider that you want to view the traffic prediction for Excessive Unique IPs Per Geo.

Prediction example

From the example image, you can view:

  • Expected Unique IP Range – Citrix ADM has predicted the expected IP range based on the traffic pattern.

  • Unique IP – Citrix ADM has predicted about 1970 unique IPs that will be transacting with the app from Malaysia.

Using this data, you can proactively take precautionary steps to avoid these excessive unique IPs.

If Citrix ADM does not have any predictions for a security violation, you can view the following message:

Prediction message

See the Setting Up topic to ensure if all the required settings are enabled to view the app security violation details.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:33 次

字数:14082

最后编辑:6年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文