Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
The Create Site process in ShieldsGuard allows users to onboard and prepare a new domain for protection. While the platform handles much of the technical work automatically, there are critical steps the user must complete to ensure full security enforcement — especially for DDoS and WAF modules.
From the main dashboard, click the Create Site button to begin. This option is located in the Welcome panel and acts as the entry point for setting up a new domain.
You’ll be prompted to enter the domain name you wish to protect (e.g., example.com
). Once submitted, click Create Site to continue.
You’ll be presented with available protection plans:
✳️ Start-Up Plan
Basic DDoS detection and Web Application Firewall access
Designed for budget-friendly, smaller websites
🚀 Enterprise Plan
Full security suite, including advanced WAF and tailored protection
Recommended for production environments or large-scale platforms
🆓 A 14-day free trial is available for all new domains.
You’ll see a summary of the selected plan:
Trial Duration: 14 days
Total Amount Due: $0.00
Proceed by clicking Start Trial
The site will now begin provisioning.
You will be asked to provide the IP address of the web server hosting your domain.
📥 Enter the IP (e.g., 192.0.2.14
) and click Save.
Once the domain is accepted, the system will automatically begin:
✔️ Creating the site record
✔️ Applying DNS routing logic
✔️ Initializing configuration settings
You will see a progress screen indicating status updates.
If your domain is not yet using ShieldsGuard nameservers, you will receive the following notice:
DNS must be correctly pointed for SSL to be issued and fully enable HTTPS traffic.
🔒 DDoS Protection
Not active by default. You must manually configure this in Protection > DDoS Protection settings.
🛡️ WAF (Web Application Firewall)
Disabled by default. You must activate it under Protection > WAF.
🌐 DNS Propagation
SSL and protection may be delayed until DNS settings are properly applied.
Once all configurations are complete and traffic starts flowing:
ShieldsGuard begins monitoring your domain
Logging and analytics activate automatically
You can fine-tune rate limiting, filter rules, and IP access
You should now proceed to activate WAF & DDoS Protection from the Protection Panel
Domain Added
✅
Trial Activated
✅
Hosting IP Configured
✅
SSL Issued (if DNS complete)
🟡 Pending
DDoS Protection Activated
❌ Must be configured manually
WAF Enabled
❌ Disabled by default
🎯 The Create Site process gives you a fast start — but enabling full protection requires a few manual steps. Don’t forget to activate DDoS protection and WAF before going live.
ShieldsGuard SEG (Secure Email Gateway) is a powerful enterprise solution that protects your organization’s email traffic against phishing, spam, malware, and data leakage.
To ensure the correct integration with your mail infrastructure (e.g., Microsoft 365, Google Workspace, or on-premise SMTP servers), setup must be handled securely and in alignment with your organization's architecture.
🛠️ SEG installation requires custom configuration.
To begin the installation and onboarding process:
➡️ Contact a ShieldsGuard support representative. They will assist you with:
MX record setup
Mail flow redirection
SPF/DKIM/DMARC alignment
TLS configuration
Policy enforcement tailored to your needs
📧 Email: support@shieldsguard.com 🌐 Or use the Support option within your admin panel.
🎯 ShieldsGuard SEG deployment is handled with the assistance of a technical specialist to ensure maximum security and compliance.
Welcome to the official documentation of ShieldsGuard — a unified, high-performance platform for real-time threat detection, DDoS mitigation, email gateway protection, and full-stack perimeter control.
This guide is designed to help you:
Understand the architecture and core capabilities of ShieldsGuard
Deploy, configure, and manage each module effectively
Investigate threats and respond with precision
Enforce policy-based access and filtering across your entire infrastructure
ShieldsGuard is a next-generation cybersecurity platform that combines:
🌐 Website & API Protection (via WAF, DDoS, Access Rules)
📧 Secure Email Gateway (phishing, spam, malware filtering)
🧠 Behavioral Analysis & Threat Intelligence
🔍 Real-Time Logging, Forensics, and Response
📄 Customizable Firewall Pages and Rule Sets
Whether you’re defending a web application, enterprise mail server, or cloud infrastructure — ShieldsGuard is engineered to give you visibility, control, and resilience.
This documentation is divided into clear, functional categories:
1. General Panel
Platform layout and core management interface
2. Overview
Real-time statistics for traffic, countries, IPs, URLs, and more
3. Protection
DDoS, WAF, and rate-limiting engine
4. Security Rules
Layered content and behavioral filtering
5. Logs
Request logs and threat incident tracking
6. Asset Management
Domain discovery, tech fingerprinting, vulnerability scans
7–9. Access, DNS, SSL
Perimeter access control and encryption settings
10. Subdomain Management
Create, manage and secure multiple services
11. Edit Page
Customize firewall challenge pages
ShieldsGuard SEG
Full documentation for Secure Email Gateway protection
This documentation is ideal for:
Security Engineers
DevOps Teams
Email Admins
SOC Analysts
Compliance Officers
If you manage infrastructure, protect users, or respond to threats — this guide is for you.
🎯 ShieldsGuard is here to simplify security and amplify control — let's protect your digital surface, together.
The Today's Data panel provides a real-time snapshot of the website's security posture and traffic behavior for the current day. It helps identify ongoing threats, traffic surges, and overall performance indicators.
Total Visits: Number of all HTTP requests received today.
Successful Requests: Requests that returned 2xx HTTP status codes.
Malicious Action Attempts: Count of requests detected as harmful or suspicious.
HTTP Risk Score: A calculated metric indicating potential danger based on error patterns.
Top Countries by Request Volume: Displayed on an interactive map.
Top IP Addresses: List of IPs sending the most requests.
Top URLs Requested: Shows which paths are most visited or potentially targeted.
Percentage changes show trends compared to yesterday.
Heat intensity on the map reflects request concentration.
Color-coded HTTP status responses (green = 2xx, red = 5xx, etc.).
Quickly detect ongoing attacks or brute-force attempts.
Identify suspicious IPs or URL abuse.
Monitor overall daily system health.
The Country Statistics panel gives insight into where your traffic is coming from over time. It helps differentiate between normal geographic distributions and potential attack patterns.
Total Visits: Total requests across all countries.
Unique Countries: Number of different country sources.
Peak Country: The country with the most requests in a single burst.
Visitor Distribution Table: A sortable list of countries and their request counts.
Visitor Map: Geographical heatmap showing traffic density.
Brighter regions on the map indicate heavier traffic.
Country flags and exact numbers enhance readability.
Spot unusual regional activity (e.g. DDoS from a new country).
Correlate with marketing campaigns or legal access boundaries.
Prioritize geo-blocking or regional filtering.
The URL Statistics section reveals which endpoints on your system are receiving the most attention — whether legitimate or malicious.
Total Visits: Global request count to all URLs.
Unique URLs: Count of distinct endpoints accessed.
Top Requested URLs: Lists the most visited endpoints (e.g. login, API, or admin paths).
URL Chart View: Visual bar representation of visit volume per endpoint.
Frequently accessed admin or login pages may be under attack.
Repeated hits on unusual URLs could suggest vulnerability scanning.
Detect brute-force or enumeration attempts.
Optimize caching or endpoint performance based on usage.
Identify exposure of unintended paths (e.g. test or backup routes).
This is the landing page for all ShieldsGuard users. Upon logging in, it provides an at-a-glance summary of their account, including registered websites, usage metrics, and access to essential management tools.
It is the central control panel for launching new domains, configuring users, and monitoring real-time activity across protected assets.
📚 Sidebar Menu
The left-hand menu provides access to all core user-level operations:
🏗️
Create Site
Add and configure a new domain to be protected
🌐
Registered Websites List
View all domains/subdomains linked to your account
👥
User Management Panel
Manage team members, roles, and permissions
👤
Profile Information
Update personal or organizational contact data
🧾
Invoices
View and download billing history
🏠
Address Management
Maintain billing/shipping/organization addresses
🔐
Two-Factor Authentication Status
Toggle or view 2FA status (critical for security)
🔑
Change Password
Update login credentials securely
🖥️ Main Content Area
The right panel contains your personalized usage summary and key action buttons:
💬 Welcome Message
Personalized greeting with your display name
🌍 Total Websites
Number of sites currently protected by your account
✅ Active Sites
List of live domains, with status indicators (🟢 = active)
📊 Requests Today
Real-time count of incoming traffic to all registered sites
➕ Create Site Button
Quick-start button to onboard a new domain
This screen acts as the entry point into the ShieldsGuard ecosystem.
Example applications:
A security analyst can log in and immediately see traffic trends across websites.
A DevOps engineer may use this view to confirm DNS propagation or SSL readiness.
An admin might onboard new sites or grant user permissions directly from here.
🟢 Green Dot
Site is active and fully protected
🔴 Red “INACTIVE” tag
2FA is not enabled (⚠️ security recommendation)
This dashboard is not just informational — it is actionable.
All navigation stems from this control panel, making it the primary cockpit for security administrators and operators.
Integrated metrics such as “requests today” and “active sites” help teams stay informed at a glance.
🎯 The General Panel gives you an instant, high-level view of your digital estate — combining usability with operational intelligence from the very first screen.
The Overview section in ShieldsGuard provides a centralized and dynamic summary of your web infrastructure’s behavior. It brings together real-time monitoring, traffic origin tracking, URL-level inspection, and status code analytics to give you a full picture of what’s happening across your protected websites.
This section is divided into the following key modules:
Get a live snapshot of your website's performance and security posture for the current day — including total visits, blocked requests, malicious attempts, and risk score evaluations.
Track where your traffic is coming from geographically. Use this to identify unusual regional surges, geo-targeted threats, or marketing effectiveness.
Discover which pages, endpoints, or services are receiving the most traffic. Analyze user access behavior, potential attack vectors, or stress points in your platform.
Uncover which IP addresses are the most active — whether legitimate users, search engine bots, or malicious actors. Includes ASN and geolocation data.
Visualize the distribution of HTTP response codes. Identify success rates, client-side errors (4xx), and server-side failures (5xx) at a glance.
The IP Statistics panel identifies the most active IP addresses and their contribution to your traffic landscape. It supports both performance tuning and security analysis.
Top IPs: List of IPs sorted by volume of requests.
ASN Information: Associated network provider or organization.
Country Origin: Geographical source of the IP.
Request bars showing the volume per IP.
Tags displaying ASN and country flag for each entry.
Flag suspicious IPs with excessive request volume.
Block repeated offenders or integrate IP reputation systems.
Whitelist trusted infrastructure (e.g., monitoring systems).
The DDoS Protection module in ShieldsGuard is your first line of defense against traffic-based denial-of-service attacks. Whether it’s volumetric floods, bot-driven login abuse, or application-layer overload, this protection engine enables you to mitigate threats before they impact your infrastructure.
⚠️ Important: After first setup, the DDoS Protection feature is disabled by default. To activate protection, you must manually select one of the available protection modes from the panel.
These modes are:
JavaScript Verification
Google Captcha
Friendly Captcha
Until one is selected and configured, your website will remain vulnerable to automated traffic-based attacks.
Navigate to Protection > DDoS Protection from the left sidebar.
Locate the DDoS Protection status section at the top.
Choose a protection mode from the dropdown:
Javascript Verification
Google Captcha
Friendly Captcha
Configure the selected mode using the provided forms.
Your protection will be enforced immediately after saving.
This mode enforces a lightweight browser-based challenge that filters out non-human traffic like bots, scripts, and scanners that do not support JavaScript execution.
Key Features:
Invisible to human users
Fast and automatic
Effective against basic botnets, curl, wget, and CLI tools
Limitations:
Advanced bots using headless browsers (e.g., Puppeteer, Selenium) may pass this challenge
Recommended Use:
Public websites
Static content delivery
When user friction must be minimal
Enables Google’s reCAPTCHA to challenge suspicious users and confirm they are human before accessing sensitive areas.
Configuration Required:
Google reCAPTCHA Site Key
Google reCAPTCHA Secret Key
Variants Supported:
reCAPTCHA v2 (checkbox or invisible)
reCAPTCHA v3 (score-based)
Advantages:
High detection accuracy
Widely recognized
Free for standard use
Drawbacks:
Adds friction to user flow
May not comply with strict privacy regulations (e.g., GDPR in EU)
Recommended Use:
Login pages
Admin panels
Account creation / payment flows
Friendly Captcha is a modern, privacy-first alternative that uses proof-of-work cryptography instead of solving puzzles.
Fields to Configure:
Secret Key (generated from Friendly Captcha panel)
Site Key
Endpoint Region (EU / US)
Advantages:
No user interaction
Fully GDPR-compliant
Does not collect or track user data
Drawbacks:
Requires an active Friendly Captcha subscription
Slight delay due to proof-of-work (milliseconds)
Recommended Use:
Privacy-focused websites
European user bases
Sites requiring seamless UX with strong bot defense
Once a protection mode is selected, you can fine-tune how and when it activates:
Defines how long a visitor stays trusted after passing the challenge.
Minimum: 600 seconds (10 minutes)
Maximum: 86400 seconds (1 day)
Example Use: Set to 1800 seconds (30 minutes) to avoid re-challenging returning users too often.
When triggered, this sets how long the protection remains active.
Range: 5 to 1440 minutes
Scenario: If set to 60 minutes, the site stays protected for one hour after an attack pattern is detected.
Define how much traffic is considered suspicious.
Time Interval (Seconds): Between 10 and 30 seconds
Request Threshold: Between 1 and 5000 requests
Example: If a single IP sends more than 1000 requests in 10 seconds, activate protection.
Sets a hard cap on the number of requests per second from a single IP address.
Minimum: 5 requests/sec
Use Case: Prevents brute-force and scraping attacks
Tip: Start with 500–700 and monitor before lowering. Use tighter limits for login or API routes.
Public Website
JavaScript Verification + Rate Limiting
Login/Authentication
Friendly Captcha + 10-minute cookie
Admin Panel
Google Captcha + Trigger Protection @ 500/10s
High-Traffic App (EU)
Friendly Captcha (EU Endpoint) + Rate Limit 300/s
Payment Gateway/API
Google Captcha + IP Limit 100/s
DDoS protection is only effective when properly enabled and tuned. ShieldsGuard provides multiple mechanisms to cover both performance and privacy concerns. The layered control—combining protection mode, duration, trigger thresholds, and IP rate limits—ensures your services stay online even during hostile traffic surges.
Always test your configuration under light load before deploying in production.
ShieldsGuard supports Google reCAPTCHA integration to enhance bot protection, DDoS challenge validation, and login security.
By adding your Google reCAPTCHA keys to the system, you ensure that automated access attempts are filtered with an additional verification layer before being allowed to interact with protected web resources.
Visit: https://www.google.com/recaptcha/admin/create
Log in with your Google account
Fill in the form:
Label: Example: ShieldsGuard Protection
Choose Type:
✅ reCAPTCHA v2 – "I’m not a robot" (recommended)
Or v3 if desired
Domains: Enter your domain (e.g., example.com
)
Accept the Terms of Service
Click Submit
You will receive two keys:
🔐 Secret Key
🌐 Site Key
Once you’ve obtained your keys:
Log in to your ShieldsGuard Panel
Navigate to: Protection > DDoS Protection > Google Recaptcha Section
Click the 🔴 Set Key button (You’ll see this as a red action button prompting configuration)
In the popup titled Edit Google Captcha Key, enter:
Secret Key (first field)
Site Key (second field)
Click the 🔒 Save button
You will receive confirmation that the keys are stored and ready for use.
Adding the keys alone is not enough. You must activate Google reCAPTCHA in your protection mode.
Go to: Protection > DDoS Protection
In the DDoS Protection Settings, set:
Protection Mode → Automatic or Google Captcha
Automatic Protection Type → Google Captcha
Save the configuration
Now, when a threshold is triggered, ShieldsGuard will serve Google reCAPTCHA challenges to the client.
To verify that Google reCAPTCHA is active:
Simulate a DDoS request (e.g., rapid refresh or tool-based probe)
Access a protected endpoint with the configured domain
reCAPTCHA challenge should appear in the browser
✅ Use reCAPTCHA v2
More reliable for user interaction
🔁 Rotate keys periodically
For improved security
🧪 Test CAPTCHA in dev mode
Ensure visual rendering and key match
🔐 Keep secret key private
Never expose this value to frontend or users
🎯 By integrating Google reCAPTCHA with ShieldsGuard, you're creating a highly effective layer of friction for automated threats, while preserving user experience for legitimate visitors.
ShieldsGuard allows full integration with Friendly Captcha, a modern, privacy-friendly CAPTCHA solution. Once integrated, Friendly Captcha can be used as a challenge mechanism within the DDoS Protection module to block automated threats without disrupting legitimate users.
🔐 Unlike traditional CAPTCHA methods, Friendly Captcha offers a user-friendly experience with high resilience against bots and headless browsers.
Register for an account (free or paid plan)
After login, navigate to the Dashboard
Click on “Create New Application”
Name your application and define the domain (e.g., yourdomain.com
)
After creation, you’ll receive:
🔐 Secret Key
🌐 Site Key
Open your ShieldsGuard admin panel
Navigate to: Protection > DDoS Protection
Scroll to the Friendly Captcha section.
Click on the 🔴 Set Key button:
This opens a modal titled Edit Friendly Captcha Key.
In the popup window:
Paste your Secret Key in the first field
Paste your Site Key in the second field
Choose your Endpoint Region from the dropdown (e.g., EU Endpoint
, US Endpoint
)
Click 🔐 Save
✅ Keys are now saved and the system is ready for use.
⚠️ Captcha setup is not complete until it’s activated under protection logic.
Go back to Protection > DDoS Protection
Under DDoS Automatic Protection, set:
Status = Automatic Protection or Friendly Captcha
Protection Type = Friendly Captcha
Configure your desired:
Trigger Threshold (requests/sec)
Protection Duration
IP Limit Rules
Save all changes
To test if Friendly Captcha is active:
Simulate rapid browsing or bot-like behavior (multiple refreshes)
You should be presented with a Friendly Captcha challenge instead of being blocked directly
This ensures human users are verified with minimal friction.
🎯 Friendly Captcha integration offers the perfect balance of strong bot defense and seamless user experience — especially valuable in public login portals, DDoS-prone environments, and signup forms.
Go to:
Privacy
Friendly Captcha is GDPR-compliant and doesn't use tracking cookies
Performance
Lightweight and ideal for mobile and low-bandwidth environments
Custom Domains
Add both domain.com
and www.domain.com
to your Friendly Captcha project
Abuse Detection
Combine with IP Reputation and Request Rate in ShieldsGuard
The Protection section in ShieldsGuard provides you with all the tools necessary to defend your infrastructure against both volumetric and application-layer attacks.
ShieldsGuard ensures complete protection against all types of DDoS attacks — from Layer 3/4 floods to complex Layer 7 HTTP-based threats.
In this section, you will find two powerful modules:
3.1 DDoS Protection – Activate automated defense against TCP/UDP floods, SYN attacks, HTTP request floods, and behavioral anomalies.
3.2 WAF – Web Application Firewall – Inspect and filter all web-layer traffic with advanced rule sets tailored to block XSS, SQLi, RCE, LFI/RFI, and more.
⚠️ Important: Both modules are independent but work best when enabled together.
We strongly recommend enabling and fine-tuning both DDoS Protection and WAF to ensure the highest level of resilience, especially in public-facing or critical environments.
👉 Click the subpages to start configuring your defenses.
This panel breaks down HTTP response codes to assess website performance, stability, and user experience.
Success (2xx): Indicates functional routes and services.
Redirects (3xx): Shows navigation flows and redirection behavior.
Client Errors (4xx): Typically caused by bad requests (e.g., 404, 403).
Server Errors (5xx): Usually reflect backend problems or overloads (e.g., 500, 503).
Donut or pie chart distribution of status codes.
Highlight of the most frequent status code.
Each code includes total count and percentage share.
Monitor for increasing 4xx/5xx errors.
Detect broken links or misconfigured services.
Ensure high 2xx ratio for healthy performance.
The Security Rules section in ShieldsGuard provides powerful tools to filter, block, or manipulate specific aspects of incoming HTTP requests. This section empowers administrators to define granular behavioral policies, harden exposed endpoints, and mitigate suspicious or malicious activity on a per-rule basis.
Each rule type is modular, giving you complete control over how your system handles traffic based on IPs, headers, methods, paths, query strings, or even post payloads.
Below is a breakdown of what each rule type allows you to control:
Define explicit IP addresses or CIDR ranges to block or allow regardless of other rules or protections.
Create rules based on the User-Agent header. Useful for blocking known bots, outdated clients, or malicious scanners.
Inspect query parameters and block requests that contain suspicious or forbidden values.
Control request behavior by filtering based on specific HTTP headers, such as Referer
, Origin
, or custom-defined headers.
Prevent requests containing specific keywords or data patterns in POST bodies. Ideal for blocking form spam or injection attempts.
Inject or modify custom headers into responses for security, debugging, or routing logic.
Block access to specific URL strings or patterns regardless of method or query.
Block entire URL path segments such as /admin
, /debug
, or /staging
. Supports wildcards and nested directories.
Obfuscate sensitive paths using encryption to prevent reconnaissance and endpoint enumeration.
Strip or replace parts of the request URI, headers, or parameters before it reaches backend services.
Bypass WAF/DDoS inspection for specific static folders (e.g., /uploads
, /assets
) to improve performance or avoid unnecessary filtering.
🧠 These security rules act as a flexible policy enforcement layer — perfect for scenarios where WAF alone is not enough or too generalized.
Proper use of Security Rules gives you surgical control over traffic behavior, making ShieldsGuard a highly adaptable security platform for modern, high-risk environments.
The BlackList & WhiteList module in ShieldsGuard gives administrators the power to allow or block specific IP addresses from accessing the protected website or application. This forms the most fundamental and direct layer of access control in your security policy.
With this module, traffic can be explicitly permitted (whitelisted) or denied (blacklisted), regardless of WAF, DDoS, or any other protection mechanisms in place.
This section allows you to define IPs or ranges that should bypass all protection engines — including:
Web Application Firewall (WAF)
DDoS Protection
Rate Limiting
Behavior-based Blocking
Use Cases:
Trusted internal IPs (corporate office, VPNs)
Monitoring systems or uptime checkers
Developers or testers who should never be blocked
Third-party services with known IPs (e.g., Stripe, PayPal, Cloud providers)
Example:
⚠️ Whitelisted IPs are treated as fully trusted — ensure they are secure and properly scoped.
This section allows you to completely ban IPs or ranges from accessing the site. Any request from a blacklisted IP will be dropped immediately.
Use Cases:
Known malicious actors
Repeated brute-force or spam sources
IPs flagged by threat intelligence
Abuse reports or geo-blocking by range
Example:
🔒 Blacklist takes absolute precedence — blocked IPs cannot bypass via any other setting.
Go to Security Rules > BlackList & WhiteList
Switch between Allowed IP Addresses or Blocked IP Addresses
Click “Add IP Address”
Enter:
Single IP (e.g., 192.0.2.10
)
IP Range / CIDR (e.g., 192.0.2.0/24
)
Save
Changes take effect immediately and will be logged in traffic analytics.
You can search IPs using the search bar
Use bulk selection for mass deletion or editing
Logs will indicate whether a request was blocked or allowed due to IP rule
Allow internal staff
Whitelist static corporate IPs
Prevent botnets & scrapers
Use blacklists with CIDR blocks
Integrate threat feeds
Automate blacklist entries via API
Avoid accidental lockout
Whitelist your own IP before testing
🛡️ IP-level control is your first line of defense. Use it to allow what you trust, and block what you know to be harmful.
The Web Application Firewall (WAF) in ShieldsGuard is an advanced, multi-layered security engine designed to protect your applications against all known Layer 7 threats — from SQL injection to file inclusion, command injection, and even data leakage.
ShieldsGuard supports three different WAF models, each accessible via separate tabs:
ShieldsGuard WAF (recommended — proprietary engine)
ModSecurity v4 (community/open standard ruleset)
ModSecurity v3 (legacy compatibility ruleset)
⚠️ Only one rule set can be active at any given time. If
ShieldsGuard WAF
is active,v3
andv4
are automatically disabled, and vice versa.
We strongly recommend using ShieldsGuard WAF for best security, performance, and enterprise-grade rule support.
ShieldsGuard WAF is a custom-built, proprietary firewall engine developed by the ShieldsGuard security engineering team. It contains handcrafted, threat-intelligence-enhanced rules, designed to detect and stop real-world attack patterns before they ever reach your application.
It is continuously updated and optimized for:
Performance under high load
Low false-positive rates
Real-time botnet and CVE protection
Enterprise-grade precision
Below is the complete list of available .conf
modules within ShieldsGuard WAF:
00_asl_whitelist.conf
Whitelisted IP/User-Agent definitions
00_asl_x_searchengines.conf
X search engine behavior filtering
00_asl_y_searchengines.conf
Y search engine behavior filtering
00_asl_z_aa_threat_intelligence.conf
Real-time threat intelligence integration
00_asl_z_antievasion.conf
Evasion technique detection
00_asl_zz_strict.conf
Strict mode for aggressive filtering
01_asl_content.conf
General content attack detection
01_asl_content_smuggling.conf
HTTP smuggling prevention
01_asl_content_z.conf
Extended payload filtering
03_asl_dos.conf
Application-layer DoS and slowloris protection
05_asl_exclude.conf
Global exclusions definition
10_asl_antimalware.conf
Malware upload and binary detection
11_asl_brute_enhanced.conf
Bruteforce attack blocking
11_asl_data_loss.conf
Sensitive data exfiltration attempts
12_asl_adv_rules.conf
Advanced heuristics for dynamic payloads
12_asl_adv_xss_rules.conf
Cross-Site Scripting (XSS) protection
12_asl_brute.conf
Basic bruteforce detection
13_asl_brute_enhanced.conf
Extended bruteforce detection
13_asl_command_injection.conf
OS command injection blocking
20_asl_useragents.conf
Suspicious user-agent filtering
21_asl_useragents.conf
Known malicious agent blocking
30_asl_antispam.conf
Spam bots and injection via forms
31_asl_urispam.conf
URI-based spam detection
45_asl_hpp.conf
HTTP parameter pollution detection
50_asl_rootkits.conf
Known webshell/rootkit patterns
51_asl_paranoid_extra.conf
Paranoid-level detection logic
51_asl_rootkits.conf
Enhanced rootkit detection
51_asl_wordpress_extra.conf
Additional rules for WordPress hardening
60_asl_recons.conf
Reconnaissance & fingerprinting detection
61_asl_recons_dlp.conf
Data leak prevention during scans
80_asl_proxy_abuse.conf
Proxy chaining, Tor & VPN abuse
98_asl_jitp.conf
Just-in-time payload heuristics
99_asl_jitp.conf
Extended payload interpretation logic
🛠️ Enterprise users receive assistance in tuning these rules with direct engineer access and 24/7 monitoring options.
📘 ModSecurity v4 Rule Set
💡 DescriptionModSecurity v4 is a structured, open-source community-driven ruleset, built around OWASP Core Rule Set (CRS) standards. ShieldsGuard supports v4 through modular
.conf
files, each focusing on specific vulnerabilities or exploit methods.
🔧 Example Rules:
REQUEST-901-INITIALIZATION.conf
Rule engine initialization
REQUEST-905-COMMON-EXCEPTIONS.conf
General exceptions for stability
REQUEST-911-METHOD-ENFORCEMENT.conf
Enforce allowed HTTP methods
REQUEST-913-SCANNER-DETECTION.conf
Identify automated vulnerability scanners
REQUEST-920-PROTOCOL-ENFORCEMENT.conf
Detect malformed HTTP requests
REQUEST-921-PROTOCOL-ATTACK.conf
Detect protocol-based evasion
REQUEST-922-MULTIPART-ATTACK.conf
Detect file upload boundary attacks
REQUEST-930-APPLICATION-ATTACK-LFI.conf
Local File Inclusion
REQUEST-931-APPLICATION-ATTACK-RFI.conf
Remote File Inclusion
REQUEST-932-APPLICATION-ATTACK-RCE.conf
Remote Code Execution attempts
REQUEST-933-APPLICATION-ATTACK-PHP.conf
PHP-specific attack patterns
REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
Generic payload anomalies
REQUEST-941-APPLICATION-ATTACK-XSS.conf
Cross-site scripting
REQUEST-942-APPLICATION-ATTACK-SQLI.conf
SQL injection detection
REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
Session hijack prevention
REQUEST-944-APPLICATION-ATTACK-JAVA.conf
Java-targeted attacks
REQUEST-949-BLOCKING-EVALUATION.conf
Decide if request should be blocked
RESPONSE-950-DATA-LEAKAGES.conf
Generic data leakage (SSN, CCN, etc.)
RESPONSE-951-DATA-LEAKAGES-SQL.conf
SQL error-based leakage
RESPONSE-952-DATA-LEAKAGES-JAVA.conf
Java stack leakage
RESPONSE-953-DATA-LEAKAGES-PHP.conf
PHP error output
RESPONSE-954-DATA-LEAKAGES-IIS.conf
IIS debug info
RESPONSE-955-WEB-SHELLS.conf
Known web shell signatures
RESPONSE-959-BLOCKING-EVALUATION.conf
Final blocking stage
RESPONSE-980-CORRELATION.conf
Multi-rule correlation logic
ModSecurity v3 is a lightweight, simplified version of v4, maintained for legacy compatibility. While not as complete or intelligent as v4 or ShieldsGuard WAF, it offers baseline protection for older stacks.
REQUEST-901-INITIALIZATION.conf
Rule engine initialization
REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
Drupal exclusions
REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
WordPress exclusions
REQUEST-903.9003-NEXTCLOUD-EXCLUSION-RULES.conf
NextCloud exclusions
REQUEST-903.9004-DOKUWIKI-EXCLUSION-RULES.conf
DokuWiki
REQUEST-903.9005-CPANEL-EXCLUSION-RULES.conf
cPanel
REQUEST-903.9006-XENFORO-EXCLUSION-RULES.conf
XenForo
REQUEST-905-COMMON-EXCEPTIONS.conf
Common exclusions
REQUEST-910-IP-REPUTATION.conf
IP reputation match
REQUEST-911-METHOD-ENFORCEMENT.conf
Method enforcement
REQUEST-912-DOS-PROTECTION.conf
DoS detection
REQUEST-913-SCANNER-DETECTION.conf
Scanner detection
REQUEST-920-PROTOCOL-ENFORCEMENT.conf
Protocol enforcement
REQUEST-921-PROTOCOL-ATTACK.conf
Protocol manipulation
REQUEST-922-MULTIPART-ATTACK.conf
Multipart abuse
REQUEST-930 to 944
Application-level attacks
RESPONSE-950 to 980
Data leakage and block logic
Go to Protection > WAF
Enable WAF Control (top toggle)
Select the desired WAF rule engine tab (ShieldsGuard WAF / v4 / v3)
Activate the .conf
modules relevant to your environment
Save and monitor – changes apply immediately
Always use ShieldsGuard WAF unless legacy compatibility is strictly required
For CMS users (WordPress, Drupal, NextCloud), enable only one CMS exclusion rule at a time
Enable all critical attack class protections (SQLi, XSS, RCE)
Disable unused protocol types to reduce false positives
For enterprise environments, contact the ShieldsGuard team for:
Rule tuning
False positive mitigation
Custom platform rules
CVE simulation and patching
ShieldsGuard WAF provides a complete application-layer security solution with options tailored for all needs — from enterprises needing expert-backed protection to legacy systems requiring minimal rules.
🔐 Choose one rule engine. Activate only what you need. Let ShieldsGuard handle the rest.
📖 Overview
The User Agent Filtering module allows you to control access to your website or application based on the User-Agent
header included in HTTP requests. This header typically identifies the browser, tool, bot, or crawler making the request.
By allowing or blocking specific User Agents, you gain powerful control over how your application interacts with browsers, bots, and potential attackers.
✅ Allowed User Agent List This section enables you to define trusted User Agents that should always be allowed access — even if other security mechanisms are in place.
Use Cases:
Allowing access to legitimate bots:
Googlebot
Bingbot
Slackbot
Permitting internal testing tools or scanners
Configuration Options:
Enter a regex pattern to match the User-Agent string
Select a sensitivity level from the dropdown
Example: Allowing ^Googlebot.*
ensures only Google’s official crawler is accepted.
🚫 Blocked User Agent List This section allows you to define unauthorized User Agents that should be completely blocked from accessing your system.
Use Cases:
Blocking known scraping tools or headless browsers:
curl
python-requests
Scrapy
Preventing spam bots or fake search engine crawlers
Configuration Options:
Define a regex pattern for partial or full User-Agent strings
Select a sensitivity level from the dropdown
Example: Blocking .*bot.*
will catch most generic bots and automated tools.
🔍 Regex Matching & Sensitivity Options When creating a rule, you must select a sensitivity level. The following four options are available:
Case Insensitive
Matches plain text without considering letter case.
Example: curl
will match Curl
, cURL
, or CURL
.
Case Sensitive
Matches plain text exactly as typed, including letter case.
Example: curl
matches only curl
and not CURL
or Curl
.
Regex Regular Expression Case Sensitive
Allows full regex usage and respects letter casing.
Example: ^SlackBot.*
matches SlackBot/1.0
, but not slackbot/1.0
.
Regex Case Insensitive
Enables full regex support while ignoring letter case.
Example: ^slackbot.*
matches SlackBot/1.0
, SLACKBOT/2.0
, etc.
⚙️ How to Add a Rule
Navigate to Security Rules > User Agent Filtering
Choose either the Allowed or Blocked tab
Click Add User Agent
In the popup:
Enter a regex pattern to match the User-Agent string
Choose a sensitivity level from the dropdown
Click Save — your rule is instantly applied
You can manage existing rules, search by regex, or delete them at any time.
🚨 Warning User-Agent headers can be easily spoofed. While User Agent Filtering is effective against basic bots and misconfigured clients, advanced attackers may forge trusted User-Agent strings.
For enhanced security:
Combine this feature with IP Reputation databases
Enforce rate limiting
Use Web Application Firewall (WAF) rules
🎯 Conclusion User Agent Filtering is a lightweight, efficient, and flexible way to block malicious bots, reduce system noise, and protect public-facing endpoints — especially APIs and marketing pages.
The HTTP Header Filtering module allows you to filter incoming HTTP requests based on the name and value of specific HTTP headers. This is useful for blocking or allowing requests based on exact or expected header content.
You can define a simple rule by providing:
A Header Title (e.g., Origin
, Authorization
, X-Custom-Header
)
A Header Content (exact match string)
Once the rule is created, incoming requests will be matched against this rule and filtered accordingly.
Go to Security Rules > HTTP Header Filtering
Click Create Header Filtering
Fill out:
Enter Header Title
Enter Header Content
Click Filter
The rule will take effect immediately
Many attacks exploit improperly validated or missing headers, including:
CSRF attacks (missing Origin / Referer headers)
Host Header Injection
API key misuse
Header filtering adds a layer of control at the gateway level to prevent such attacks early.
🎯 HTTP Header Filtering is a quick way to enforce header presence and exact values, adding lightweight security to your application endpoints.
The Custom Headers module allows you to define and inject HTTP response headers into all responses served by your ShieldsGuard-protected site. This is useful for improving security, enhancing privacy, and customizing browser behavior — without modifying your application code.
You define:
Header Variable Name – The name of the HTTP response header (e.g., X-Frame-Options
, X-Powered-By
, X-XSS-Protection
)
Header Variable Content – The value of that header (e.g., DENY
, nosniff
, or any string)
Once created, this header will be automatically included in every HTTP response.
Navigate to Security Rules > Custom Response Headers
Click Create Header Variable
Fill in:
Header Variable Name
: the header key you want to define
Header Variable Content
: the value you want to send
Click Create Variable
The header is now injected into all HTTP responses globally
Add X-Content-Type-Options: nosniff
to prevent MIME-type sniffing
Add X-Frame-Options: DENY
to block clickjacking
Add X-Powered-By: ShieldsGuard
to override default server info
HTTP response headers allow you to:
Reduce browser-based attack surfaces
Hide unnecessary backend information
Enforce client-side behavior securely
This feature helps maintain a secure-by-default posture.
🎯 With just a few clicks, you can set custom headers across your entire site — no coding required.
The Query String Filtering module enables you to control and sanitize the query parameters (GET variables) attached to incoming requests.
By defining allowed or blocked query strings on a per-path basis, you can protect sensitive endpoints, APIs, and web forms against tampering, injection, or unexpected behavior.
This adds a powerful application-layer control that complements WAF rules and general request validations.
Allow only expected parameters on specific pages.
Block unexpected or malicious parameters.
Remove untrusted query parameters automatically.
Harden API endpoints, authentication flows, and payment pages.
You define rules specifying:
Target Page Path:
(e.g., /login
, /api/user/info
, /checkout
)
Allowed Query Keys:
(e.g., email
, token
, id
)
When a request is made:
Only the listed keys are allowed.
Any additional parameters are either removed or blocked based on configuration.
Allowed Keys for /login
email
redirect_uri
Incoming Request:
Behavior:
admin=true
is removed or causes a block, depending on rule setting.
Allow Only These Keys: Block or strip any parameter not explicitly listed.
Action Mode:
Remove unauthorized arguments silently
Block the request if unauthorized arguments are detected
Multiple Rules: Create multiple rules for different paths.
Protect login and signup endpoints
Prevent parameter injection
Secure API requests
Enforce strict parameter structure
Harden payment callbacks
Only allow signed, expected arguments
Reduce attack surface
Disallow noisy or unnecessary parameters
Whitelist only absolutely necessary parameters.
Avoid allowing “debug”, “test”, or unused parameters on production systems.
Combine Query String Filtering with WAF to maximize protection.
Review URL patterns regularly as your application evolves.
Go to Security Rules > Query String Filtering.
Click Add New Rule.
Enter the Page Path.
Define all allowed query keys.
Choose the action (Remove unauthorized / Block unauthorized).
Save the rule.
🛡️ The rule will be active immediately for all matching requests.
Query filtering happens before request routing to backend servers.
Filtering is case-sensitive for parameter names.
Be cautious on dynamic URLs where parameters may vary unexpectedly.
🎯 By enforcing strict query string structures, you prevent misuse, abuse, and accidental exposure of your application's internal logic.
The Block POST Values module allows you to block incoming HTTP POST requests based on specific field names and values in the request body. This helps stop malicious or unwanted content before it reaches your backend.
You define two things:
POST Key: The name of the POST parameter you want to inspect
(e.g., message
, username
, comment
, bio
)
POST Content: The exact value to block within that field
If a match is found, the request is immediately blocked at the edge.
Go to Security Rules > Block POST Values
Click Add New Rule
Enter:
Enter Post Key
: the POST parameter to monitor
Enter Post Content
: the value that should trigger blocking
Click Block
The rule is enforced instantly
Block POSTs where the field comment
contains the value buy now
Block username
field if it contains admin
(to prevent impersonation)
Blocking harmful content at the POST layer helps prevent:
Spam submissions in contact forms or comments
Basic SQL injection or XSS payloads
Unwanted automated POSTs or abuse attempts
This feature acts as a first line of defense.
🎯 POST Value Blocking is a fast and simple way to filter out known bad inputs before they can do harm.
The Block Request module allows you to block HTTP requests based on specific key-value matches found in either query strings (GET) or form data (POST). This helps prevent suspicious or unwanted data from reaching your application.
You define two simple parameters:
Request Key Value – The name of the request parameter to monitor (e.g., search
, token
, redirect
)
Request Content – The exact value that should be blocked (e.g., SELECT
, javascript:
, admin
)
If the system detects a request with that key and matching value, it blocks the request immediately.
Go to Security Rules > Block URL Request Parameters
Click Block Request
Fill in:
Enter Request Key Value
: the parameter name to inspect
Enter Request Content
: the value to block
Click Block
The rule is now active and will block matching requests
Block search=SELECT
to prevent SQL Injection attempts
Block redirect=javascript:
to mitigate Open Redirects
Block token=admin123
to prevent brute-force token usage
By inspecting incoming request parameters, this feature allows early detection of payload-based attacks. It helps reduce exposure to:
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Command Injection
Open Redirects
🎯 Blocking malicious key-value combinations at the request level helps neutralize attacks before they reach your backend systems.
The Encrypt Path module allows you to restrict access to specific URL paths by requiring a username and password. It functions like lightweight HTTP authentication and provides edge-level protection — without touching backend code.
Protect internal pages, admin panels, or test environments
Control access to staging or early-access content
Secure downloadable resources with a password
Prevent unauthorized users from accessing private directories
You define:
Username – Only users with this username can proceed
Password – Must be provided to gain access
Encrypted Path – The full or partial URL path to protect
Authorization Message (optional) – Custom message shown when access is denied
When someone accesses a protected URL:
A login prompt appears
If the credentials match, the request is allowed
If incorrect, the user sees your custom denial message and access is blocked
Go to Security Rules > Encrypt Path
Click:
🔵 Username
to set or change the login username
🟠 Password
to set or change the login password
🟢 Set a Message
to define a custom message for failed logins (e.g., "Bu alana erişim yetkiniz yok")
🟧 Specify the page to be encrypted
and enter the full URL you want to protect (e.g., https://shieldsguard.com/admin
)
Click Encrypt to activate protection
Protect /admin-panel
with username: sg
and a strong password
Show a denial message like: “You do not have access to this area”
Ensure only internal users with credentials can reach the path
Encrypt Path allows secure, no-code restriction of sensitive areas:
Without installing plugins
Without modifying server configs
Without writing auth logic
It's ideal for developers and admins who want to quickly lock down access to certain pages.
Use strong, non-production credentials (base64 encoded, not encrypted)
Always access encrypted paths over HTTPS
Combine with Rate Limiting to stop brute-force attempts
Do not use this for dynamic login pages — leave those to your backend authentication
🎯 Encrypt Path gives you instant, secure access control — with zero backend integration.
The Remove Request Value module allows you to strip unwanted or sensitive arguments from requests before they reach your backend servers. This can help prevent misuse of hidden features, developer flags, or outdated query parameters.
You define:
Page Path – The URL to monitor (e.g., /checkout
, /api/data
)
Argument Content – The name of the parameter (e.g., debug
, token
, env
) to remove from the request
If a request includes the defined path and contains the specified argument, that argument is silently removed.
Navigate to Security Rules > Remove Request Value
Click Create Redactable Argument
Fill in:
Enter Page Path
: the full or partial URL where the rule applies
Enter Argument Content
: the parameter name to strip
Click Redact / Red Et
The argument will be removed from all future requests to that path
Request Before:
GET /submit?email=test@example.com&debug=true
Rule:
Page Path: /submit
Argument Content: debug
Request After:
GET /submit?email=test@example.com
→ debug
parameter is removed
Removing unnecessary or dangerous parameters helps:
Prevent abuse of undocumented features
Eliminate developer/debug switches from production
Clean up noisy or irrelevant input before processing
🎯 Remove Request Value ensures clean, secure, and predictable request handling — directly at the edge.
The Block URL Path module allows you to block access to specific URL paths on your site. Any incoming HTTP request that matches the defined path will be instantly blocked — regardless of its headers, parameters, or IP address.
You provide a full or partial URL path, such as:
/admin
/private/data.json
https://yourdomain.com/debug
Once saved, all requests to that exact path will be blocked before reaching your backend.
Go to Security Rules > URL Path Blocking
Click Block URL Path
Enter the full or partial path to be blocked
Click Block
The rule is instantly enforced
Block access to /admin
or /debug
pages
Block file downloads from /backup.zip
Block access to hidden or deprecated directories
Blocking unused or sensitive paths helps protect:
Admin panels
Development environments
Exposed data files
Misconfigured routes
This is a quick and effective way to reduce your visible attack surface.
🎯 Block URL Path offers an easy way to disable public access to risky paths without needing to change application code or server configurations.
The Exclude Directory from Protection module allows you to bypass all active ShieldsGuard security mechanisms (WAF, rate limiting, filtering, etc.) for a specific directory path.
This is useful for public, static, or third-party resources that may not function properly under strict protection.
You define:
Directory Path (e.g., /uploads
, /public/images
, https://yourdomain.com/assets/
)
Once added, all requests to that path and its subpaths are excluded from protection and forwarded directly to your origin server.
Navigate to Security Rules > Exclude Directory
Click Specify Directory to Exclude from Protection
Enter the full path of the directory
Click Exclude from Protection
All traffic to that directory will now bypass ShieldsGuard security logic
Static file directories (JS, CSS, fonts, images)
File upload areas with large payloads
Public folders for client download access
No security filtering will apply to excluded directories
Use only for safe, public, and static content
Avoid excluding sensitive areas such as /admin
, /api
, or dynamic logic handlers
🎯 This feature is designed for performance and compatibility — only use it where security impact is minimal.
The Access Log module in ShieldsGuard gives you real-time visibility into every single HTTP request received by your protected site. Unlike the Security Log, which only shows suspicious or blocked events, the Access Log displays a complete timeline of all traffic — regardless of whether the request was allowed or not.
This tool is essential for:
Traffic analysis
User behavior tracking
Request debugging
Service monitoring
Each entry in the Access Log includes:
The Access Log includes a powerful filter bar to quickly narrow down logs based on:
IP Address
URL or path fragment
HTTP Method (GET, POST, etc.)
Status Code (e.g., 200, 403, 500)
User-Agent
Time Range
Use these filters to:
Investigate unusual spikes in traffic
Identify error-generating endpoints
Track specific users or bots
Analyze how visitors interact with your application
The right-hand panel provides live statistics, including:
Current Requests Per Second
Most Visited URLs
IPs making the most requests
Distribution of HTTP Status Codes (Success vs Errors)
⚡ Live data updates in a 10-minute window. Use this view to detect bursts of activity or service pressure instantly.
Combine Access Log with Security Log to correlate attack attempts with successful access.
Use the Advanced Search to trace individual sessions across different routes.
Monitor frequently requested but invalid URLs to identify potential probing behavior.
Logs are stored with timezone-aware timestamps.
Only the most recent data (last 10 minutes) is shown by default. For historical data, use date range filters.
Export options may be available depending on your ShieldsGuard license level.
🎯 Use Access Log for operational insight, usage visibility, and technical diagnostics. It is your always-on recorder of everything that reaches your infrastructure — whether benign or suspicious.
The Logs section in ShieldsGuard provides real-time and historical visibility into all incoming traffic and security events across your protected applications.
With powerful filtering, search, and categorization capabilities, this section allows you to:
Monitor all request activity to your website
Investigate malicious behavior and blocked threats
Conduct forensics and incident response
Track behavioral patterns of users and attackers
The log system is divided into two focused modules:
Track every single request made to your site, including:
IP address
URL path
Request method (GET/POST/PUT/...)
Status code (200, 403, 404, 503, etc.)
User Agent
Timestamp
Ideal for:
Identifying traffic trends
Debugging routing or frontend issues
Auditing general request flow
See Access Log →
Displays only filtered, blocked, or flagged activity, including:
Brute-force attacks
SQLi/XSS/JITP pattern detections
DDoS mitigations
WAF or custom rule triggers
IP-based blocks
Ideal for:
Analyzing blocked threats
Validating protection effectiveness
Conducting post-incident investigations
See Security Log →
All logs are fully filterable by:
Date and time range
IP address
URL path
HTTP method
Attack type (for security log)
User-Agent
Status code
Logs can also be exported or reviewed in real time for immediate response and situational awareness.
🎯 ShieldsGuard Logs provide transparency, traceability, and visibility into every corner of your website’s traffic — empowering you to investigate, understand, and defend with confidence.
IP Address
The source of the request
URL
The full path of the requested resource
Method
HTTP method used (GET, POST, PUT, etc.)
Status Code
HTTP response status (200, 403, 404, etc.)
User Agent
Client/browser that made the request
Time
Timestamp of the request
Analyze 404 error patterns
Filter logs by Status Code = 404
Detect abusive crawling
Track User-Agent patterns and frequency
Confirm site uptime and responsiveness
Monitor consistent 200s across core pages
Investigate user sessions
Filter by single IP and observe full request flow
Troubleshoot feature errors
Combine URL + Method + Status = 500
Investigate unusual traffic
See spikes in Access Log
Trace blocked attack
Review Security Log for attack type and payload
Identify brute-force bots
Filter for login URL + POST + 403
Correlate WAF actions
View Security Log + URL breakdown
Troubleshoot service issues
Filter Access Log by 503 or 5xx codes
The Asset Management module is the heart of your external surface visibility. It provides a centralized dashboard that continuously tracks, catalogs, and monitors the digital assets you own — including domains, subdomains, associated technologies, ports, IPs, and metadata.
Whether you're managing a single website or a complex infrastructure with dozens of services, this module gives you the visibility needed to secure your perimeter.
Summary Cards:
Total Asset (Domain) – Number of discovered domains/subdomains.
Technologies – Total count of unique technologies detected across assets.
Critical Vulnerabilities – How many unresolved, high-risk findings exist.
Statistics Panels:
Asset Statistics – Radar chart showing distribution of technologies, ports, and asset counts.
Vulnerability Statistics – Visual classification of detected issues by severity (Critical, High, Medium, Low, Info).
Each domain entry provides a comprehensive technical and security profile. You can expand it to view:
1. 🌐 General Information
IP address & Port
Protocol used (HTTP/HTTPS)
ASN & ISP ownership
Abuse score
Country and geolocation
2. 🧩 Technologies
CMS platforms (e.g., WordPress, Plesk)
Libraries and frameworks (Bootstrap, Elementor, Google Fonts)
Server stack (PHP, MySQL, NGINX)
3. 🧾 HTTP Headers
Full response headers (security headers, cache controls, cookies)
4. 🔐 SSL Information
Certificate issuer, subject, expiration dates, cipher strength
SSL health based on scan engine (e.g., TLS 1.2, weak ciphers)
5. 📡 DNS Panel
A/AAAA/MX/CNAME/NS/TXT records
SPF, DKIM, DMARC validation
DNSSEC validation state and change logs
6. 🆔 WHOIS Information
Domain registrar
Expiration & creation dates
Raw WHOIS output
✅ This level of insight allows you to monitor your assets not just by IP or hostname, but by actual risk, technology, exposure, and ownership.
You can search and filter assets by:
Domain name
Technology used (e.g., PHP, WordPress, React)
Open port (e.g., 80, 443)
This helps isolate vulnerable or misconfigured environments, or group assets by technology stack.
Without visibility, you can't protect what you don't know you have.
The Asset Management module helps:
Detect shadow IT (unknown domains or services)
Prevent tech stack sprawl and unmanaged exposure
Monitor changes in infrastructure over time
Serve as a foundation for vulnerability assessment
Discover forgotten subdomains
Avoid exposure of legacy services
Track CMS & plugin usage
Identify outdated or risky versions
Watch SSL expiration dates
Avoid certificate downtime or MITM exposure
Validate security headers
Spot missing XSS/CORS/HSTS protections
Map IP and provider attribution
Detect hosting/ISP changes or anomalies
Run asset discovery scans on a regular schedule (e.g., weekly).
Review port usage to detect unexpected exposures (e.g., non-standard ports).
Monitor for newly added technologies that increase your attack surface.
Combine with Vulnerability Scan (6.3) for actionable insights.
🎯 ShieldsGuard’s Asset Management doesn’t just give you a list — it builds a living, evolving picture of your digital perimeter. Know your assets. Reduce your risk. Secure with confidence.
The Asset Management section is where you can track, analyze, and evaluate the external surface of your digital infrastructure. ShieldsGuard actively scans your domains, subdomains, technologies, and open ports — building a complete picture of your environment and its exposure.
This section consists of three functional modules:
6.1 Asset Management – Centralized view of domains, ports, and technologies
6.2 Network Topology – Visual mapping of interconnected nodes and services
6.3 Vulnerability Scan – Detection and classification of security weaknesses
🔎 This section allows you to monitor what you own — and ensure nothing is exposed without your awareness.
The Security Log module in ShieldsGuard provides a dedicated view of security-related events — including blocked threats, monitored attacks, WAF rule triggers, brute-force attempts, and behavioral anomalies.
Unlike the Access Log, which shows all requests, the Security Log focuses only on suspicious, malicious, or policy-violating activity. It’s your go-to dashboard for investigating real threats and validating that ShieldsGuard is actively protecting your system.
Each entry in the Security Log includes:
Action
Whether the threat was MONITORED
, BLOCKED
, or ALLOWED
under observation
URL Address
The target page or endpoint
Attack Type
Detected pattern or threat category
IP Address
Origin of the attack or suspicious request
Date & Time
When the event occurred
Detail Button
Shows full request context (payloads, headers, rule triggered)
Bruteforce Attack
Repeated login attempts on login pages
SQL Injection
Malicious query content in GET/POST data
Cross-Site Scripting (XSS)
JavaScript-based payloads attempting injection
Command Injection
OS-level attack patterns in payloads
JITP
Just-in-time payload detection (heuristic)
DoS/Rate Abuse
Excessive request triggering protections
Header Tampering
Suspicious Origin
, Referer
, or User-Agent
headers
Investigate incidents: Search by IP, attack type, or URL to locate threats.
Validate rule effectiveness: Ensure WAF rules and behavior protections are firing as expected.
Correlate actions: Trace security events in combination with Access Log entries from the same IP or time range.
Audit protection logs: Show proof of blocked or mitigated attempts for compliance/reporting.
You can narrow the Security Log by:
Date range
URL Address
Attack Type
Operation Type (Monitored / Blocked)
IP Address
All results can be expanded for detailed insight, including exact payloads, headers, and triggered security rules.
Review a blocked SQL injection
Find exact URL, parameter, and source IP
Investigate login brute-force attack
Track multiple POST attempts to login endpoint
Monitor zero-day behavior
Identify JITP matches or unclassified anomalies
Detect abuse patterns over time
Filter by date and attack type
Produce a security report
Export attack data with classification and IPs
Review this log daily during high-risk periods (campaigns, launches).
Cross-reference with your WAF configuration to optimize rule coverage.
Use IPs found here to enrich your blacklist or inform your threat feeds.
Enable notifications or alerts if your plan includes real-time webhook/report integration.
Security Log provides evidence that ShieldsGuard is actively defending your infrastructure, giving you visibility into threats that were:
Mitigated automatically
Blocked before execution
Detected and monitored (for behavioral learning)
🎯 The Security Log is your battlefield journal — it records every blocked attempt, monitored anomaly, and protected moment. It’s where real cyber defense becomes visible.
The Network Topology module offers a visual and interactive map of your entire internet-facing infrastructure. It illustrates the relationships between your domains, IP addresses, technologies, ports, and vulnerabilities in real-time — enabling you to understand your attack surface as a connected structure, not just a list.
🧠 Think of this as a cybersecurity radar that shows how all your digital assets are linked, and where your weaknesses may lie.
🧱 Nodes:
Each node represents an entity in your infrastructure:
Domain or subdomain (e.g., app.yourcompany.com
)
IP Address
Open port or protocol (e.g., 443/HTTPS, 21/FTP)
Technology in use (e.g., PHP, MySQL, WordPress)
Associated vulnerability (if found)
🔗 Connections:
Lines between nodes show direct associations such as:
Domains resolving to IPs
IPs running services on specific ports
Ports linked to technologies or risk factors
🎨 Node Indicators:
Each node is color-coded based on its type or threat level:
🔵 Domain
🟠 IP Address
🔴 Critical Vulnerability
🟡 High Risk
🟢 Safe
⚫ Unknown/Other
Zoom & Pan — Explore the map freely or fit to screen
Filter Nodes — Search by domain, IP, or vulnerability
Layout Options — Switch between graph models (e.g., CoSE, Circle, Grid)
Export — Download your topology as a PNG for reports or auditing
Node Detail Panel — Click any node to view:
Associated ports
Technologies
Resolved IP
Detected vulnerabilities
Traditional asset lists can’t show how things are connected — and attackers exploit relationships.
This view helps you:
Detect exposed nodes with shared risk
Identify forgotten or shadow systems still reachable
Spot single points of failure or shared infrastructure risk
Understand potential pivot paths in case of breach
A vulnerable service on shared IP
Multiple domains exposed through one IP
A forgotten subdomain still active
Visualized next to your main infrastructure
A non-SSL port open to internet
See it linked under an insecure protocol node
A legacy PHP app next to new stack
Legacy risk adjacent to modern services
Review the topology weekly
Spot new or unauthorized connections
Export before change deployments
Compare before/after network footprint
Investigate isolated nodes
May indicate misconfigurations or forgotten assets
Monitor for red nodes
Indicates confirmed vulnerabilities
🎯 The Network Topology module turns your digital surface into a visual map of risk. Not only will you see what’s online — you’ll see what’s connected, and what needs to be secured.
The Subdomain Manage module allows you to create, configure, and monitor your subdomains with the same level of control and protection as your main domain.
You can manage DNS integration, toggle HTTPS redirection, and apply ShieldsGuard’s proxy security — all from a single dashboard.
🛡️ Subdomains often serve as entry points for attackers. Managing them effectively ensures that your entire domain hierarchy is secured, not just your root domain.
✅ Subdomain Listing
Each row in the interface shows:
Subdomain Name (e.g., login.yourdomain.com
)
DNS Label (e.g., login
)
Proxy Status (ACTIVE / INACTIVE)
HTTPS Redirection (toggle)
Resolved IP Address
Action Buttons (Create / Manage / Delete)
Ensure your DNS records include an A record pointing the subdomain to the correct IP.
Open the Subdomain Manage module.
Locate or define the subdomain you wish to configure.
Click Create to activate ShieldsGuard’s edge protection and monitoring for that subdomain.
⚠️ If a subdomain does not appear, it may be missing from your DNS configuration.
You can enable HTTPS enforcement for any subdomain individually. This ensures:
All http://
traffic is redirected to https://
SSL certificates (ShieldsGuard-managed or custom) are applied
Secure, encrypted connections are enforced site-wide
Toggle ShieldsGuard protection per subdomain:
ACTIVE → All traffic passes through ShieldsGuard's protection engine (WAF, DDoS, IP filtering)
INACTIVE → Traffic bypasses ShieldsGuard and goes directly to the origin server
✅ Keeping the proxy enabled is recommended to ensure security policies are applied consistently.
Manage – Open detailed configuration and analytics for that subdomain
Delete – Remove ShieldsGuard management and protection (does not delete DNS record)
🎯 Subdomain Manage ensures that every endpoint under your domain is actively protected, encrypted, and visible to your security team.
📖 Overview
The Vulnerability Scan module provides real-time detection, classification, and visibility into the known and potential security weaknesses across your entire digital surface.
This system continuously analyzes exposed services, technologies, protocols, and configurations to identify vulnerabilities — then ranks them by severity so you know exactly what to fix, and where.
🚨 ShieldsGuard helps you stay ahead of attackers by showing what they see before they exploit it.
Web application stack (WordPress, PHP, Plesk, etc.)
SSL/TLS configuration and certificate health
HTTP headers and content security policies
Open ports and exposed services
Publicly accessible endpoints
CMS plugin versions
Protocol vulnerabilities and misconfigurations
Missing or misconfigured DNS and email security
All findings are categorized using a clear, color-coded system:
Each severity level helps prioritize remediation based on real-world impact.
Every finding includes:
Affected domain and URL
Risk level (color and label)
Vulnerability type or CVE (if applicable)
Description of the issue
Discovery method
Exact URL or port
Suggested resolution
Timestamp
Quick access to “View” for more details
📊 Risk Score Gauge — Visual snapshot of risk posture
📑 Security Findings Table — Fully filterable by severity or domain
🧮 Vulnerability Histogram — Severity-wise chart
🔍 Domain Filter — Narrow scope by subdomain or asset
📤 Export Capabilities — Download reports for audits or incident response
Integrate scans into your change and release cycle.
Treat HIGH and CRITICAL findings as blockers in CI/CD.
Review LOW/INFO items regularly for hygiene improvements.
Use scan results to update your WAF, IP filters, and rules.
🎯 ShieldsGuard Vulnerability Scan is your early warning system — detecting what could be exploited before attackers do, and giving you a prioritized, actionable plan to fix it.
The Access module in ShieldsGuard allows administrators to control and restrict incoming traffic based on geolocation, Internet Service Providers (ISP), and ASN (Autonomous System Number). It functions as a policy engine to regulate who can reach your system based on where they come from and who provides their connection.
This module is essential for:
Blocking high-risk geographies
Allowing only selected ISPs
Reducing noise from unwanted regions or anonymous networks
Enforcing compliance and regional access policies
Access rules in this module are divided into three powerful and independent filters:
Purpose: Block or allow access based on the visitor's country.
Functionality:
Select countries from a dropdown list.
Add them to your block list or allow list.
Traffic from blocked countries is denied immediately at the edge.
Use Cases:
Block regions associated with botnet traffic.
Enforce geopolitical or compliance boundaries.
Allow only specific country-level user bases (e.g., national infrastructure).
🌐 Geolocation is determined by IP — updated via public geo-IP databases.
Purpose: Allow or block access based on the ISP name (e.g., Turk Telekom, Comcast, China Telecom).
Functionality:
Enter ISP names as they appear in resolved IP data.
Apply rule to allow only trusted networks or block known problematic ones.
Use Cases:
Restrict access to enterprise-level traffic from known commercial providers.
Block residential proxies or cloud ISP abuse sources.
Whitelist research institutions or infrastructure providers.
Purpose: Enforce access control at the Autonomous System Number (ASN) level — the unique identifier assigned to ISPs and large network blocks.
Functionality:
Search for and add ASN numbers to your allow or block list.
Highly precise — ensures targeting entire IP allocations tied to an organization.
Use Cases:
Block all traffic from anonymous VPN or hosting services (e.g., ASN: 15169 – Google Cloud, ASN: 8075 – Microsoft Azure)
Only allow traffic from ASN of government or telecom partners
Stop persistent attacks coming from a specific ASN
✅ ASN data provides more granularity than basic geolocation and helps isolate infrastructure-based threats.
Combine filters for layered access logic: Block high-risk countries + disallow known VPN providers.
Use ASN blocking when IP rotation makes per-IP filtering ineffective.
Always allow trusted ISPs or infrastructure providers explicitly.
Monitor Access Logs to refine access rules over time.
🎯 The Access module is your traffic gatekeeper — allowing only the right users from the right networks, and blocking everyone else before they even touch your system.
The Edit Page module in ShieldsGuard gives you full control over the visual and functional structure of your challenge verification pages, such as the JavaScript Firewall Page and the Captcha Firewall Page.
These pages appear to visitors when:
DDoS or WAF challenges are triggered
Captcha validation is required
JavaScript execution is being verified before access is granted
With this module, you can fully customize the look and feel of these interaction points, ensuring a seamless user experience and maintaining brand consistency.
You can customize two different firewall presentation pages:
JavaScript Firewall Page Used when verifying browser JavaScript capabilities during bot protection.
Captcha Firewall Page Used when FriendlyCaptcha or other CAPTCHA validation is required before access.
Live code editor with syntax highlighting
HTML/CSS customization panel
Support for dynamic ShieldsGuard variables
Split between required and optional placeholders
Lightweight, flexible templating for full branding control
Depending on the page type, you’ll see the required variables listed on the left:
Common Mandatory Variables
🔐 These variables are required for the firewall process to function correctly.
These are useful for debugging or including transparency in the UI shown to the user.
You can customize:
Typography (fonts, headings, paragraphs)
Layout (padding, flex, container size)
Colors, borders, shadows
Logo, favicon, background image (via embedded CSS or inline HTML)
Sample Customization Use Cases:
Match your corporate color scheme
Add your logo and custom copy
Change instructional messaging
Any missing required variable may cause the verification to fail.
Edits apply instantly, but always preview on multiple devices.
A misconfigured challenge page may lead to access denial or increased bounce rate.
🎯 The Edit Page module gives you complete creative control over one of the most critical user interaction points — your security verification flow. Use it to balance usability with strong perimeter protection.
The DNS (Domain Name System) module in ShieldsGuard allows you to manage, edit, and monitor all DNS records associated with your domains — from A
records to TXT
, MX
, CNAME
, and more.
Whether you're launching a new application, configuring email security, or validating services like Google, Yandex, or Microsoft, this module provides a full-featured, user-friendly interface to handle all DNS-level operations.
🛡️ Proper DNS management is the first step in securing and ensuring the availability of your web infrastructure.
Go to DNS module
Click Create DNS
Select the record type (A, TXT, etc.)
Enter:
DNS Name (e.g., @
, www
, api
)
IP/Value depending on record type
TTL (or keep it auto)
Click Create
Entry appears in the DNS record table
✏️ You can edit any record later or delete it with one click.
🎯 The DNS module gives you full control of how your domain resolves and behaves — from performance to security and compliance. One misconfigured record can break access or create a vulnerability — with ShieldsGuard, you're always in control.
Isolated login system
auth.example.com
Separate WAF rules for authentication
Client portal
client1.example.com
Customized security & reporting
Dev/staging environments
staging.example.com
Hidden from public, managed securely
Public APIs
api.example.com
Rate limited, filtered by IP or headers
Enable HTTPS on every subdomain
Prevent downgrade attacks and build trust
Keep proxy active
Apply full ShieldsGuard protection stack
Disable unused subdomains
Reduce unnecessary surface area
Regularly review subdomain list
Detect orphaned or forgotten assets
🔴 Critical
Exploitable vulnerabilities with high impact
🟠 High
Major misconfigurations or outdated technologies
🟡 Medium
Weaknesses requiring mitigation
🔵 Low
Minor risks or hygiene issues
⚪ Info
Informational or best practice observations
CVE-2020-24778 (GSAP)
High
JavaScript library
Missing HSTS Header
Medium
HTTP response headers
Misconfigured CORS
Medium
API endpoints
SSL Certificate Near Expiry
Medium
TLS
Missing HttpOnly on Cookies
Low
Set-Cookie directive
No DKIM or SPF Records
Info
Email configuration
WordPress XML-RPC Brute Force Exposure
Medium
WP login subsystem
REST API Enumeration
Info
WP-JSON endpoint
Patch critical exposures quickly
Sort by severity and act on 🔴/🟠 first
Track remediation over time
Re-scan after fixes and compare findings
Improve compliance posture
Export finding logs with timestamps
Investigate patterns
Correlate vulnerabilities across domains
Confirm system health after deploy
Run scan post-update to detect regressions
Country
Broad
Use to restrict region-level access
ISP Name
Mid-level
Use for enterprise allowlists or proxy blocks
ASN Number
Fine-grained
Ideal for blocking entire provider networks
{shieldsguard_javascript}
Inserts JavaScript verification engine
{shieldsguard_captcha}
Loads CAPTCHA engine interface (on captcha page)
{captcha_output}
Displays captcha success/fail status
{refresh_auth}
Token refresher for authenticated challenge
{request_id}
Unique identifier for the request/session
{ip_address}
Displays visitor's IP address
{page_url}
Displays current page URL
{user_agent}
Displays the client’s User-Agent
Always keep required variables intact
Ensure challenge logic functions properly
Test design on desktop and mobile
Ensure responsiveness across devices
Use minimal animations
Reduce script load time and browser impact
Avoid removing <meta>
tags
They affect display scaling and bot detection
Host background images securely (HTTPS)
Prevent mixed content browser warnings
A
Maps a domain or subdomain to an IPv4 address
AAAA
Maps a domain to an IPv6 address
CNAME
Points a subdomain to another domain
MX
Defines mail exchange servers for email delivery
TXT
Used for verifications (SPF, DKIM, DMARC, Google, etc.)
NS
Defines name servers for the domain
SRV
Specifies services with protocol, port, and weight
PTR
Used for reverse DNS lookups
Always set TTL > 300 for stable records
Reduce DNS lookup overhead
Keep @
and www
records consistent
Ensure root and subdomain both resolve properly
Use SPF/DKIM/DMARC for all domains
Prevent email spoofing and phishing
Monitor TTL on validation records
Google, Microsoft, Yandex validations often use TTL 1
Avoid wildcard CNAMEs unless needed
They can override valid subdomain records
The SEG Dashboard (Secure Email Gateway Dashboard) provides a centralized view of your email security posture. It displays live analytics, user activities, and threat intelligence associated with the inbound and outbound email traffic passing through ShieldsGuard’s filtering infrastructure.
This dashboard acts as the command center for monitoring phishing, malware, spam, and content policy enforcement in real time.
The top panel offers real-time summaries of four core threat categories:
Phishing
Attempts to trick users into revealing sensitive information via email (e.g., fake login pages)
Malware
Emails containing malicious attachments or links
Spam
Unsolicited or bulk email categorized as junk
Content Filter
Violations of configured content policies (e.g., blocked file types, sensitive keywords)
Each box shows:
Total blocked emails
Percentage of total filtered emails
Color-coded risk indicator (blue/green/red/orange)
This table displays detailed forensic records of any detected threat.
Analysis Time
Timestamp when email was scanned
Verdict
Result of the analysis (e.g., Blocked, Clean)
Reason
Detected threat type or violated rule
If no threats are detected, the table will indicate an empty status with a success message.
Tracks end-user interactions with the email system.
User
Email address of the user
Action
Login activity or message interaction (e.g., read)
Date
Timestamp of the action
🧠 Useful for security auditing, behavior analysis, and insider threat monitoring.
Displays geolocated sources of email-based threats on a global map.
Real-time pinpointing of phishing or malware origins
Helps identify targeted attack regions or patterns
Color-coded intensity by threat type and frequency
A timeline-based chart showing categorized email security trends such as:
🔵 Blocked Words
Detected keywords in content
⚫ No Threat Found
Safe emails
🟠 Suspicious
Suspicious but not blocked content
🔴 Phishing, Spam
Confirmed threats
🟤 Maximum File Size
Exceeds allowed attachment limit
The graph provides a historical overview and trends for daily/weekly security metrics.
SOC visibility
Real-time monitoring of email threat flow
End-user auditing
Track user access and interactions
Threat landscape awareness
Map-based geointel of where threats originate
Incident response readiness
Quickly identify and isolate infected users
Email is still the #1 vector for:
Ransomware
Credential theft
Business email compromise (BEC)
Insider abuse
The SEG Dashboard ensures you're not blind to any of it.
🎯 The SEG Dashboard gives you clarity, visibility, and control over the most exploited attack surface in cybersecurity: email. Know what’s being blocked, what’s being delivered, and who’s interacting with it.
The Reporting module provides structured, exportable security summaries based on email threat data collected across a specified date range. These reports help administrators and SOC analysts gain insight into:
Phishing and spam trends
Targeted users
Source domains and email addresses
Most attacked countries
Content policy violations
🛡️ With one click, you can generate a full overview of the email threat landscape across your organization.
At the top of the interface, select a Start Date and End Date, then click Generate Report to produce a new log-based analysis for that timeframe.
Each generated report includes:
Date Range
Threat Score (letter grade: A to F)
Creation Timestamp
View Button to access full details
📁 Reports are securely stored and viewable anytime within the panel.
🌍 Most Attacked Country Statistics
Heatmap and table showing where detected threats originate
Helps identify geographic targeting trends
Supports regional threat intelligence decisions
📬 Targeted Recipients
Email addresses most frequently attacked
Indicates users at high risk of phishing or impersonation
Users receiving the most spam
Reveals inboxes under heavy unsolicited email load
✉️ Threat Sources
Top attack-sending email addresses
Identifies malicious or spoofed senders
Phishing email sender domains
Domains used to trick users into entering sensitive data
Spam sender domains
Domains responsible for the most unwanted or abusive email content
📌 These can be quickly added to blocklists from within the platform for immediate mitigation.
📊 System Summary Chart
Pie chart visualization of total detected threats, by type:
Phishing
Spam
Content Filter Violations
Helps prioritize focus areas for remediation and education efforts.
📄 Content Filter Summary
Displays most frequently blocked words from emails
Useful for tuning keyword-based content filters (e.g., blocklist for sales, adult terms, scams)
Example:
discount
1
Prove security value to stakeholders
Share monthly threat summaries
Identify vulnerable inboxes
Focus user awareness training
Track threat evolution
Compare report scores over time
Export for compliance or audits
Archive PDF or CSV versions
Feed data to SIEM or SOC
Export structured intel from reports
Generate reports on a weekly or monthly basis
Track score trends to evaluate improvements
Block repeat sources found in multiple reports
Cross-reference targeted users with login activity or incidents
🎯 The Reporting module transforms raw email security data into actionable intelligence — making it easier to detect, prove, and respond to threats across your organization.
The Analyzed section provides a full forensic archive of all previously scanned objects — including files, URLs, emails, and domains. Each entry is tagged with a verdict (e.g., MALICIOUS, SUSPICIOUS, CLEAN), along with timestamped analysis results.
This module functions as a centralized threat intelligence archive, enabling security analysts to review, trace, and act on past security incidents.
Displays every scanned file (usually attachments) from your email traffic.
Use Cases:
Investigate file-based malware campaigns
Track file re-use across emails
Identify common malicious payloads (.zip, .rar, .tar, etc.)
🛡️ Files marked as MALICIOUS are automatically quarantined.
Lists all scanned URLs from email content or headers.
Use Cases:
Detect phishing and credential-harvesting links
Investigate shortened URLs or obfuscated redirectors
Flag suspicious tracking or C2 infrastructure
🔍 All URLs are evaluated through real-time link sandboxing and threat intel feeds.
Full log of email-based security events.
Tabs Inside:
Attachments
Sender Domain
URL analysis
Mail metadata
📩 This is the core view for threat hunting via mail object correlation.
Tracks sending domains flagged in prior scans.
Includes domain reputation tracking. Allows inline enforcement through the Block/Allow modal.
🛠️ Helps quickly isolate problematic or abused senders across email campaigns.
The Domain submodule under the Analyzed section provides a focused view of all email-sending domains identified during threat analysis. It tracks the domain origin of each message flagged as SPAM, PHISHING, or SUSPICIOUS, and enables security teams to take proactive action by blacklisting or whitelisting them directly from the interface.
🛡️ This module helps you eliminate malicious infrastructure at its source — the sending domain.
Each row represents a unique sending domain from past emails that triggered a security verdict.
Clicking the action button opens the Domain Filter Operations modal, where you can:
Select the filter type:
✅ Allow (Whitelist)
🚫 Block (Blacklist)
Apply instantly across your SEG rules
Prevent future emails from or allow communications to trusted domains
✔️ This functionality helps you create a dynamic trust model around incoming mail infrastructure.
Phishing emails from lookalike domains (e.g., out1ook.com
)
Spam relays from marketing platforms
Spoofed sender addresses from legitimate domains (if SPF/DKIM fails)
Unknown domains with no DNSSEC, DMARC, or low TTL
Sort by verdict to focus on high-priority domains (PHISHING > SPAM).
Repeated appearances across multiple users indicate targeted campaigns.
Combine this with 3.3 Mail to see the full context of delivery, recipients, and message content.
🎯 The Domain module gives you strategic control over what infrastructure can — and cannot — communicate with your users. It’s one of the most effective ways to stop email-based threats at the source.
The URL submodule under the Analyzed section provides a full history of all URLs extracted from emails, including body content, headers, attachments, or redirection paths. Each link is automatically scanned and classified based on its security reputation and behavior.
This module is essential for identifying phishing pages, malicious redirects, C2 infrastructure, and other web-based threats embedded in email messages.
🛡️ Every clickable link in a received email is a potential phishing trap. This module helps you stop threats before users ever click them.
Each link is analyzed using a combination of:
Static pattern matching
Heuristic content scoring
Threat intelligence feeds
Redirect chain inspection
Embedded JavaScript or form behavior detection
Lookalike login pages (micros0ft-login[.]com
)
Fake bank or finance domains
One-click tracker URLs from mail marketing platforms
URLs embedded in file attachments
Obfuscated links with suspicious redirections (bit.ly
, t.co
, custom cloakers)
Filter by verdict to isolate risky URLs
Use timestamps to identify campaign patterns
Click the actions icon to:
View email message where the URL appeared
Block the associated domain
View sandbox or reputation context
If a URL is confirmed as dangerous:
Add it to ShieldsGuard's internal blocklist
Trigger auto-block on similar URLs in future
Notify affected users
Add sender domain to email block policy (see 3.4 Domain)
🎯 The URL module gives you a forensic window into phishing infrastructure — empowering your team to stop web-based threats long before a user clicks the link.
The Files submodule within the Analyzed section provides a complete historical log of all scanned file attachments processed by ShieldsGuard SEG.
These files are typically extracted from emails and analyzed in real-time using static and dynamic malware analysis engines. The verdict assigned to each file allows analysts to identify harmful content before it reaches end users.
🛡️ Every file scanned here is a potential entry point for ransomware, trojans, and spyware. Monitoring this data is critical for your email security posture.
⚠️ Files flagged as MALICIOUS are automatically quarantined and blocked from delivery.
Each file is directly linked to the email message it was extracted from. You can:
View the full Mail ID and associated metadata
Analyze the Sender Domain, Attachments, and URLs in the same panel
Take action (e.g., block domain, quarantine user)
Common file formats analyzed:
.doc
, .xls
, .pdf
– Office-based exploits
.zip
, .rar
, .tar
– Archive attacks with embedded payloads
.js
, .vbs
, .ps1
– Script-based threats
.exe
, .dll
– Direct executables
.img
, .iso
, .lnk
– Advanced initial access formats
Filter files by verdict to quickly review only malicious or suspicious entries.
Use timestamps to correlate large-scale attack waves or targeted campaigns.
Combine this module with 3.3 Mail for full context.
🎯 The Files module is your forensic vault for malicious attachments — a vital tool for hunting, prevention, and incident response.
File Name
Unique name or hash of the file
Analysis Time
When the file was scanned
Verdict
Result (e.g., MALICIOUS, CLEAN, MAX FILE SIZE)
Actions
Email link, contextual detail button
URL Address
Full link found in email or file
Analysis Time
Date/time it was scanned
Verdict
MALICIOUS / SUSPICIOUS / CLEAN
Actions
View in context or add to blacklist
Mail ID
Unique ID for the email object
Sender
Origin email address
Recipient
User inbox address
Verdict
SPAM / PHISHING / BLOCKED WORDS / MAX SIZE / SUSPICIOUS
Actions
View full email forensic analysis
Sender Domain
Domain that sent malicious/spam emails
Verdict
SPAM / SUSPICIOUS / PHISHING
Actions
Add to Blacklist or Whitelist
Sender Domain
The domain that sent the analyzed email
Verdict
Classification result (SPAM, PHISHING, SUSPICIOUS)
Actions
Add to blocklist or whitelist
SPAM
Domain responsible for bulk/unwanted email content
PHISHING
Domain used in impersonation, credential theft, or scam campaigns
SUSPICIOUS
Newly registered, low-reputation, or anomaly-indicating domains
Block phishing campaign sources
Instantly blacklist high-risk sender domains
Whitelist known partners
Ensure no interruption in legitimate email flow
Analyze domain-based attacks
View clusters of suspicious or recurring sources
Enrich block/allow lists
Make data-driven trust/distrust decisions
Review domain list weekly
Catch evolving phishing infrastructure
Auto-block newly registered domains
Many threats originate from fresh TLDs
Use with DMARC/SPF validation logs
Validate whether spoofing is occurring
Sync with other filters (URL, Mail)
Apply protection holistically
URL Address
The full extracted URL from the email
Analysis Time
Date and time the URL was scanned
Verdict
Classification (MALICIOUS, SUSPICIOUS, CLEAN)
Actions
View context, related message, or take remediation
MALICIOUS
Confirmed phishing, malware delivery, or C2 domain
SUSPICIOUS
Unusual behavior or structure, flagged for caution
CLEAN
Verified safe through sandbox and intelligence checks
Detect phishing campaigns
Identify credential harvesting sites targeting users
Block malicious redirectors
Trace shortened or obfuscated URLs
Investigate advanced threats
Analyze links leading to download-based malware
Monitor new infrastructure
Spot newly registered or zero-day phishing domains
Monitor “SUSPICIOUS” verdicts closely
These often turn malicious in short time
Cross-correlate URLs with sender domain
Helps spot coordinated phishing infrastructure
Track repeat URL patterns
Identify campaigns across multiple recipients
Regularly blacklist high-risk domains
Prevent future compromise
File Name
The original or hashed name of the file
Analysis Time
Timestamp of when the file was processed
Verdict
Final analysis result (e.g., MALICIOUS, SUSPICIOUS, CLEAN, MAX FILE SIZE)
Actions
View contextual details (related email, sender, etc.)
MALICIOUS
Confirmed malware or dangerous file behavior
SUSPICIOUS
Indicators of compromise or obfuscation, but not fully confirmed
MAXIMUM FILE SIZE
File exceeds configured scan threshold, not analyzed
CLEAN
File passed all security checks
Track malware campaigns
Identify reused or recurring malicious attachments
Audit file-based threats
Analyze when and how a file entered the system
Investigate delivery paths
Correlate file to sender, recipient, and source domain
Triage based on file type
Block dangerous extensions (.exe, .zip, .js, .rar)
The Mail submodule under the Analyzed section provides a complete forensic record of all analyzed email messages processed by ShieldsGuard SEG.
Each email is dissected into its components — sender, recipient, content, attachments, URLs, and headers — and is scanned for spam, phishing, malware, and policy violations.
🛡️ This is your central point of investigation for every threat, anomaly, or suspicious message caught by the email security gateway.
Mail ID
Unique identifier for the email
Analysis Time
Timestamp when the email was scanned
Sender
Email address of the sender
Recipient
Email address of the recipient
Verdict
Final evaluation result
Actions
Detailed analysis button + blacklist/restore
SPAM
Unsolicited or bulk email flagged by filters
PHISHING
Attempt to steal credentials or impersonate legitimate services
BLOCKED WORDS IN CONTENT
Message contains restricted keywords or phrases
SUSPICIOUS
Anomalous patterns but no confirmed malicious behavior
MAXIMUM FILE SIZE
Email contains attachment too large to analyze
📌 Emails with confirmed threats are automatically quarantined or blocked depending on policy.
Clicking “View” opens a multi-tab analysis window, breaking down the message into:
🧷 File Attachments
Lists all files extracted, scanned, and their verdicts (linked to 3.1 Files).
🌐 URL Analysis
Displays all embedded links, redirect paths, and verdicts (linked to 3.2 URL).
📭 Sender Domain
Identifies the domain reputation, historical behavior, and filter actions (linked to 3.4 Domain).
✉️ Mail Details
Header data, SPF/DKIM/DMARC result, and message metadata.
Investigate a suspicious email
See full metadata, attachments, and URLs
Trace phishing attempts
Filter verdict by PHISHING and review target users
Identify high-risk senders
Review senders that appear repeatedly
Validate false positives
Re-analyze mail verdict and override manually
Filter by Verdict (PHISHING, SPAM, etc.)
Search by Mail ID, Sender, or Recipient
Blacklist sender domain directly from action panel
Restore messages (if applicable) from quarantine
Investigate all PHISHING verdicts
Prevent credential harvesting and fraud
Monitor SUSPICIOUS verdicts daily
Spot new or stealthy attack methods
Cross-reference file and URL tabs
Understand full attack chain
Use sender domain tab for blacklist ops
Block entire source infrastructure if repeated
🎯 The Mail module is the forensic foundation of your SEG — giving you everything you need to investigate, trace, and respond to email-based threats in depth.
The Sender Domain module empowers administrators to manage trust decisions for email senders based on their domain or full email address. This includes manual allow/block actions, as well as enforcement of SPF (Sender Policy Framework) validation outcomes.
It’s your front line for rejecting spoofed messages, phishing attempts, and untrusted senders before they even reach the user.
🛡️ This is where you take control of who is allowed to deliver email into your system — and who is not.
This module includes two primary areas:
Purpose: Manually block or allow senders by domain or full email address.
Domain/Email
Enter a domain (e.g., example.com) or full address (e.g., name@example.com)
Status
BLOCKED or ALLOWED
Date Added
When the filter was applied
Actions
Delete / Modify
Use Cases:
Block spam or phishing domains that bypass filters
Whitelist trusted partners that were mistakenly flagged
Pre-authorize known safe mail sources
🎛️ This section offers immediate enforcement and overrides engine-based verdicts.
Purpose: Define how the system handles different SPF validation outcomes for inbound mail.
SPF (Sender Policy Framework) helps verify whether a domain is authorized to send on behalf of its claimed source. ShieldsGuard supports rule-based enforcement of SPF failures.
✅ SPF Validation States & Configuration Options
Failed
SPF failed — sender is not listed in domain's DNS; usually spoofed or unauthorized
Reject / Quarantine / Tag / Notify
Suspicious Delivery
Appears sent from unauthorized source but not 100% failed
Allow or Tag with warning
Unverified Source
SPF exists but is incomplete — cannot verify sender
Deliver or Quarantine
No Record
Domain has no SPF record at all
Deliver or Reject
Invalid Record
SPF is misconfigured or malformed — cannot validate
Deliver with tag or drop
Temporary Error
DNS/SPF server unreachable during validation
Deliver with caution
Each status has configurable policies:
✅ Action (Deliver / Drop / Quarantine / Tag)
🏷️ Add custom tags (e.g., spf-failure
)
📬 Send alert or notification to admin/SOC
If a phishing message arrives from bank-login.com
and the SPF check fails:
ShieldsGuard tags the email with SPF: failure
Admin sets action to “Drop email”
The message never reaches the inbox
SPF filtering prevents sender spoofing
Domain-level blocking minimizes threat exposure
You can enforce zero-trust mail sourcing across the org
Protects employees from impersonation (e.g., fake CEO, HR, finance requests)
Always drop SPF “FAIL” messages
Prevents spoofed domain abuse
Review “No Record” cases manually
Avoid blocking legitimate but misconfigured domains
Use sender whitelist sparingly
Never allow overly broad or suspicious domains
Enable tagging for “Suspicious”
Improve user and SOC visibility
🎯 With Sender Domain control and SPF enforcement, you build a trustworthy perimeter for your inbox — rejecting impersonation, spam, and misconfigured infrastructure before it causes harm.
The SSL module in ShieldsGuard allows you to manage SSL/TLS settings for your domain — ensuring that all data exchanged between users and your website is encrypted, secure, and standards-compliant.
This module helps you:
Enable HTTPS redirection
Upload and manage custom SSL certificates
View certificate status and key requirements
🛡️ SSL is the foundation of web trust and encryption. ShieldsGuard makes it easy to manage, enforce, and validate your certificates in one secure panel.
Function: Automatically redirects all HTTP traffic to HTTPS for the selected domain.
Why It’s Important:
Ensures all sessions are encrypted
Prevents downgrade attacks
Boosts SEO rankings and browser trust
Status Toggle:
When enabled, all requests to http://yourdomain.com
are forcibly redirected to https://yourdomain.com
.
Function: Allows you to upload and use SSL certificates purchased or issued from a third-party Certificate Authority (e.g., DigiCert, Let's Encrypt, Sectigo).
When to Use:
You have your own commercial certificate
You use an internal CA for enterprise networks
You rotate certificates manually or via automation
Process:
Enable the toggle: Use your own SSL files
Provide:
.cer
file content (certificate)
.key
file content (private key)
1. .cer for SSL
Paste the certificate body (PEM format)
Example begins with:
-----BEGIN CERTIFICATE-----
2. .key for SSL
Paste the associated private key (PEM format)
Example begins with:
-----BEGIN PRIVATE KEY-----
⚠️ Both the
.cer
and.key
must match. Mismatched pairs will fail to bind and will leave the domain unsecured.
If no custom certificate is provided, ShieldsGuard will apply a default secure SSL certificate from its managed CA.
Includes:
Valid TLS configuration
Strong ciphers
Browser compatibility
Domain validation
For most users, the default ShieldsGuard SSL is sufficient and actively maintained.
Certificates must be in PEM format
Upload content manually or via API (if available)
Certificate status may take a few minutes to propagate
You can update certificates at any time without downtime
🎯 SSL isn't just a technical necessity — it's a trust signal. ShieldsGuard ensures that your encryption is always up to standard, whether you use built-in protection or bring your own certificate.
The Mail Settings section allows administrators to configure detailed filtering and enforcement rules for email messages. These rules can be applied based on file attachment types, message body content, or sender domain — providing a flexible, policy-driven approach to mail security.
Each submodule here is proactive: instead of waiting for a threat to be detected, you can pre-define what should be blocked or allowed.
Reactive protection (signature detection, heuristic scanning) is vital — but without strong preventive filters, many threats can still reach users.
Mail Settings enables you to:
Define what content is acceptable
Block specific threats before analysis
Reduce false negatives through custom logic
Enforce organization-specific compliance (e.g., no .exe
, block profanity, whitelist partners)
Purpose: Control what types of files are allowed or denied in email attachments.
Features:
Block by file extension (e.g., .exe
, .js
, .scr
)
Allow only safe formats (e.g., .pdf
, .docx
)
Apply to inbound, outbound, or internal email traffic
Define rules based on filename patterns or hashes
Use Cases:
Block delivery of dangerous executables
Allow Office documents, deny archives like .rar
Prevent delivery of macro-enabled files
🛡️ Combine with 3.1 Files module to analyze verdicts of previously seen files.
Purpose: Filter incoming or outgoing emails based on the presence of specific keywords or phrases in the message body.
Features:
Keyword-based content detection
Case-sensitive and pattern-based matching
Custom blacklist enforcement
Word-based sensitivity control
Use Cases:
Block profanity or internal data leakage
Detect business-sensitive phrases (e.g., “wire transfer”, “invoice attached”)
Filter unwanted marketing language or banned slogans
Enforce legal compliance (GDPR-sensitive data mentions)
📌 Blocked terms are logged under the “BLOCKED WORDS IN CONTENT” verdict in 3.3 Mail and 2. Reporting.
Purpose: Manually manage a list of allowed or blocked sending domains.
Features:
Maintain dynamic whitelist and blacklist of sender domains
Override automated classification (e.g., always allow trustedpartner.com
)
Protect users from known malicious sender domains
Use Cases:
Block domains used in persistent phishing attacks
Allow mission-critical external partners regardless of content filters
Isolate third-party marketing platforms that trigger spam rules
🚫 Domains marked as blacklisted will result in all emails being blocked automatically — even if the message content is clean.
🎯 The Mail Settings module helps you stay one step ahead — by deciding what should never enter your inbox in the first place.
The File module within Mail Settings provides administrators with advanced control over how email attachments are handled — by file size, file type, and custom YARA-based detection rules.
This policy-driven module allows you to prevent harmful or unwanted files from ever reaching inboxes, going beyond reactive detection to enforce proactive attachment restrictions.
🛡️ Blocking risky file types and enforcing size limits is one of the most effective methods to prevent ransomware, spyware, and trojan delivery.
This section includes 3 core functionalities:
Purpose: Define the maximum allowed file size for incoming email attachments.
Use Cases:
Block large .zip
or .iso
files often used in malware attacks
Prevent system overload from heavy media attachments
Enforce compliance on data flow and DLP restrictions
⚠️ Files exceeding the limit are blocked and flagged as
MAXIMUM FILE SIZE
in analysis.
Purpose: Define which file types (extensions) should be allowed or denied.
Features:
Add file types manually (case-insensitive)
See creation timestamp
Delete or edit file types at any time
Use Cases:
Enforce acceptable attachment policy
Reduce false negatives in malware delivery
Restrict executable file propagation via email
📌 No file types are blocked by default — use this to implement strict control based on your organization’s risk appetite.
Purpose: Define custom YARA-based scanning rules to detect pattern-matching malware or indicators of compromise within files.
Use Cases:
Detect malware using behavior or code structure
Identify documents with embedded macros or known obfuscation
Implement IOC-based scanning tailored to your threat intel
🧠 YARA rules allow deep inspection beyond file name or type — for example, scanning for embedded strings, hex patterns, or exploit markers.
🎯 The File module gives you proactive control over the what of every email — defining exactly which attachments are acceptable, and which are a threat.
The Mail Body module allows administrators to create and enforce custom content filtering rules by blocking emails that contain specific keywords or phrases within the body of the message.
This is a proactive mechanism designed to stop unwanted, offensive, or high-risk content from reaching end users — regardless of the email’s origin or structure.
🛡️ This feature is especially useful for preventing social engineering, profanity, data leakage, and policy violations within incoming or outgoing mail.
🔤 Input Field: Add one or more keywords to be blocked
🛑 Banned Words List: Visual panel showing all terms currently enforced
➕ Add Button: Instantly activate a keyword as a blocked term
🗑️ Delete Options: Manage or remove terms at any time
When an email is received:
ShieldsGuard scans the body content of the email (including HTML and plain text).
If any of the banned keywords are found, the message is flagged.
The email is then:
Quarantined or dropped (depending on policy)
Logged in 3.3 Mail as BLOCKED WORDS IN CONTENT
Counted in dashboard statistics and reporting
Keywords are case-insensitive.
You can use partial or exact match logic (e.g., reset
blocks password reset
, reset-link
, etc.).
Regular updates to keyword lists improve relevance over time.
Avoid overblocking by testing with common business phrases.
🎯 The Mail Body module ensures that no message reaches your users if it contains unwanted, dangerous, or prohibited language — enforcing policy with precision and speed.
Always enable HTTPS redirection
Enforce encryption for all users
Upload only trusted certificates
Avoid self-signed or test certs in production
Use 2048-bit keys or higher
Ensure strong cryptographic protection
Regularly monitor certificate expiry
Prevent service disruption due to expiration
Validate intermediate chains if needed
Some browsers require full trust chain
File Filtering
Block .exe
, .js
, .vbs
, .scr
, .iso
by default
Mail Body
Monitor and regularly update keyword list
Sender Domain
Review reputation data before whitelisting
Current File Size Limit
Displayed in MB (e.g., 99 MB
)
Set New Limit
Manually enter a new max size threshold
.exe
, .scr
, .vbs
, .js
❌ Block (high risk)
.docm
, .xlsm
, .iso
❌ Block or quarantine
.pdf
, .docx
, .xlsx
✅ Allow (if not abused)
Rule Description
Short name for the rule
Rule Content
YARA-compatible rule body (syntax required)
Creation Date
When rule was added
Actions
View / Delete
Prevent malicious executables
Block known high-risk extensions
Maintain system stability
Set file size limits to avoid overload or abuse
Respond to targeted threats
Write YARA rules for specific threat families
Regularly update file policy
Align with emerging attack techniques
Prevent profanity
damn
, hell
, f***
Blocks offensive emails
Block internal data keywords
confidential
, NDA
, internal use only
Stops sensitive leaks
Stop known phishing terms
login here
, verify account
, password reset
Blocks social engineering attempts
Enforce marketing/legal policy
free trial
, discount
, unsubscribe
Reduces spam and marketing abuse
3.3 Mail
Displays blocked messages using body filter
2. Reporting
Includes content filter verdicts in stats
3.4 Domain
Combine with domain-based filters for targeted blocking
Regularly audit banned words
Avoid false positives, adjust as context changes
Tailor rules per region or department
Localize language, culture-sensitive filters
Monitor reporting panel for filter trends
Know which terms are triggered most often