LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started
  2. 5. Logs

5.1 Access Log

Previous5. LogsNext5.2 Security Log

Last updated 9 days ago

📖 Overview

The Access Log module in ShieldsGuard gives you real-time visibility into every single HTTP request received by your protected site. Unlike the Security Log, which only shows suspicious or blocked events, the Access Log displays a complete timeline of all traffic — regardless of whether the request was allowed or not.

This tool is essential for:

  • Traffic analysis

  • User behavior tracking

  • Request debugging

  • Service monitoring


🧠 What You Can See

Each entry in the Access Log includes:

Field
Description

IP Address

The source of the request

URL

The full path of the requested resource

Method

HTTP method used (GET, POST, PUT, etc.)

Status Code

HTTP response status (200, 403, 404, etc.)

User Agent

Client/browser that made the request

Time

Timestamp of the request


🔍 Advanced Filtering Options

The Access Log includes a powerful filter bar to quickly narrow down logs based on:

  • IP Address

  • URL or path fragment

  • HTTP Method (GET, POST, etc.)

  • Status Code (e.g., 200, 403, 500)

  • User-Agent

  • Time Range

Use these filters to:

  • Investigate unusual spikes in traffic

  • Identify error-generating endpoints

  • Track specific users or bots

  • Analyze how visitors interact with your application


📈 Real-Time Analytics

The right-hand panel provides live statistics, including:

  • Current Requests Per Second

  • Most Visited URLs

  • IPs making the most requests

  • Distribution of HTTP Status Codes (Success vs Errors)

⚡ Live data updates in a 10-minute window. Use this view to detect bursts of activity or service pressure instantly.


📋 Use Case Scenarios

Scenario
Use Access Log to...

Analyze 404 error patterns

Filter logs by Status Code = 404

Detect abusive crawling

Track User-Agent patterns and frequency

Confirm site uptime and responsiveness

Monitor consistent 200s across core pages

Investigate user sessions

Filter by single IP and observe full request flow

Troubleshoot feature errors

Combine URL + Method + Status = 500


🛠️ Tips

  • Combine Access Log with Security Log to correlate attack attempts with successful access.

  • Use the Advanced Search to trace individual sessions across different routes.

  • Monitor frequently requested but invalid URLs to identify potential probing behavior.


📌 Notes

  • Logs are stored with timezone-aware timestamps.

  • Only the most recent data (last 10 minutes) is shown by default. For historical data, use date range filters.

  • Export options may be available depending on your ShieldsGuard license level.


🎯 Use Access Log for operational insight, usage visibility, and technical diagnostics. It is your always-on recorder of everything that reaches your infrastructure — whether benign or suspicious.