LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started

5. Logs

πŸ“– Overview

The Logs section in ShieldsGuard provides real-time and historical visibility into all incoming traffic and security events across your protected applications.

With powerful filtering, search, and categorization capabilities, this section allows you to:

  • Monitor all request activity to your website

  • Investigate malicious behavior and blocked threats

  • Conduct forensics and incident response

  • Track behavioral patterns of users and attackers


πŸ“Š Log Categories

The log system is divided into two focused modules:


πŸ” 5.1 Access Log

Track every single request made to your site, including:

  • IP address

  • URL path

  • Request method (GET/POST/PUT/...)

  • Status code (200, 403, 404, 503, etc.)

  • User Agent

  • Timestamp

Ideal for:

  • Identifying traffic trends

  • Debugging routing or frontend issues

  • Auditing general request flow

See Access Log β†’


πŸ›‘οΈ 5.2 Security Log

Displays only filtered, blocked, or flagged activity, including:

  • Brute-force attacks

  • SQLi/XSS/JITP pattern detections

  • DDoS mitigations

  • WAF or custom rule triggers

  • IP-based blocks

Ideal for:

  • Analyzing blocked threats

  • Validating protection effectiveness

  • Conducting post-incident investigations

See Security Log β†’


πŸ“… Log Filtering Features

All logs are fully filterable by:

  • Date and time range

  • IP address

  • URL path

  • HTTP method

  • Attack type (for security log)

  • User-Agent

  • Status code

Logs can also be exported or reviewed in real time for immediate response and situational awareness.


βš™οΈ Use Cases

Objective
Use the Logs to...

Investigate unusual traffic

See spikes in Access Log

Trace blocked attack

Review Security Log for attack type and payload

Identify brute-force bots

Filter for login URL + POST + 403

Correlate WAF actions

View Security Log + URL breakdown

Troubleshoot service issues

Filter Access Log by 503 or 5xx codes


🎯 ShieldsGuard Logs provide transparency, traceability, and visibility into every corner of your website’s traffic β€” empowering you to investigate, understand, and defend with confidence.

Previous4.11 Exclude Directories from ProtectionNext5.1 Access Log

Last updated 9 days ago

5.1 Access Log
5.2 Security Log