LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started
  2. 5. Logs

5.2 Security Log

Previous5.1 Access LogNext6. Asset Management

Last updated 9 days ago

πŸ“– Overview

The Security Log module in ShieldsGuard provides a dedicated view of security-related events β€” including blocked threats, monitored attacks, WAF rule triggers, brute-force attempts, and behavioral anomalies.

Unlike the Access Log, which shows all requests, the Security Log focuses only on suspicious, malicious, or policy-violating activity. It’s your go-to dashboard for investigating real threats and validating that ShieldsGuard is actively protecting your system.


πŸ” What It Captures

Each entry in the Security Log includes:

Field
Description

Action

Whether the threat was MONITORED, BLOCKED, or ALLOWED under observation

URL Address

The target page or endpoint

Attack Type

Detected pattern or threat category

IP Address

Origin of the attack or suspicious request

Date & Time

When the event occurred

Detail Button

Shows full request context (payloads, headers, rule triggered)


🎯 Common Attack Types Logged

Attack Type
Description

Bruteforce Attack

Repeated login attempts on login pages

SQL Injection

Malicious query content in GET/POST data

Cross-Site Scripting (XSS)

JavaScript-based payloads attempting injection

Command Injection

OS-level attack patterns in payloads

JITP

Just-in-time payload detection (heuristic)

DoS/Rate Abuse

Excessive request triggering protections

Header Tampering

Suspicious Origin, Referer, or User-Agent headers


πŸ§ͺ How to Use

  • Investigate incidents: Search by IP, attack type, or URL to locate threats.

  • Validate rule effectiveness: Ensure WAF rules and behavior protections are firing as expected.

  • Correlate actions: Trace security events in combination with Access Log entries from the same IP or time range.

  • Audit protection logs: Show proof of blocked or mitigated attempts for compliance/reporting.


πŸ” Filtering & Search Capabilities

You can narrow the Security Log by:

  • Date range

  • URL Address

  • Attack Type

  • Operation Type (Monitored / Blocked)

  • IP Address

All results can be expanded for detailed insight, including exact payloads, headers, and triggered security rules.


πŸ“‹ Use Case Scenarios

Situation
Security Log Helps You...

Review a blocked SQL injection

Find exact URL, parameter, and source IP

Investigate login brute-force attack

Track multiple POST attempts to login endpoint

Monitor zero-day behavior

Identify JITP matches or unclassified anomalies

Detect abuse patterns over time

Filter by date and attack type

Produce a security report

Export attack data with classification and IPs


πŸ” Best Practices

  • Review this log daily during high-risk periods (campaigns, launches).

  • Cross-reference with your WAF configuration to optimize rule coverage.

  • Use IPs found here to enrich your blacklist or inform your threat feeds.

  • Enable notifications or alerts if your plan includes real-time webhook/report integration.


🧠 Why It Matters

Security Log provides evidence that ShieldsGuard is actively defending your infrastructure, giving you visibility into threats that were:

  • Mitigated automatically

  • Blocked before execution

  • Detected and monitored (for behavioral learning)


🎯 The Security Log is your battlefield journal β€” it records every blocked attempt, monitored anomaly, and protected moment. It’s where real cyber defense becomes visible.