Overview: Security Reports¶
Security reports are used to produce a summary of your WAF protected applications, virtual servers or policies. When generating a security report summary, you can either use a system-provided template, or a custom report. Once you prompt BIG-IP Next Central Manager to generate a report, you will recieve a summary of incoming requests, trends in violations, an overview of a policy, virtual server, or application over a certain time, and potential vulnerabilities to an attack.
Based on the security report selected, a PDF is created and exported to your local system. The security reports summary details information relating to the policy, virtual server, or application and the top results are based on the overall detected attacks, followed by the top applications, virtual servers, or policies by category selections. In addition, the security report summary compares the last time period to the previous time period’s report.
Note: Security report summaries are only generated manually. The security report itself provides the configuration of specific objects and data you would like to review once you generate a security report summary.