Threat Investigation
The threat investigation enables displaying results on the total number of the access log and the details based on the filters. Filters include: Time Range, Domain, Source IP, Path, Attack Type, HTTP Method, Status, User Agent, Referer, Manual Rule Id, Inject Payload, Inject Attack Type, Region, Destination IP, In Whitelist IP, Inject Rule Id, Args.