Log Analysis & Filtering

Search, filter, and analyze your security logs to identify patterns and threats.

Filtering Options

Time Range Filters

  • Last Hour: See current attack activity
  • Last 24 Hours: Daily attack patterns
  • Last Week: Weekly trends and persistent threats
  • Custom Range: Specific date and time periods

Search by IP Address

  • Single IP: Find all attacks from one source
  • IP Range: Search for attacks from related IPs
  • Geographic Filter: Attacks from specific countries
  • ISP Filter: Attacks from specific hosting providers

Search by Attack Type

  • Rule ID: Find specific types of attacks (e.g., 942100 for SQL injection)
  • Rule Group: Filter by OWASP, WordPress, or custom rules
  • Severity Level: High, medium, or low severity attacks
  • Attack Category: SQL injection, XSS, file inclusion, etc.

Search by Target

  • URI Pattern: Attacks targeting specific pages or directories
  • File Extensions: Attacks on .php, .asp, .jsp files
  • Admin Areas: Attacks on /admin, /wp-admin, /login
  • API Endpoints: Attacks on /api/, /rest/, /graphql

Advanced Analysis

Pattern Recognition

Coordinated Attacks:

  • Multiple IPs attacking simultaneously
  • Same attack patterns from different sources
  • Attacks following news of vulnerabilities

Persistent Attackers:

  • Same IP attacking over multiple days
  • Escalating attack complexity
  • Targeting multiple pages or functions

Automated vs Manual:

  • Automated: Regular intervals, identical patterns, known tools
  • Manual: Irregular timing, varied approaches, custom payloads

Geographic Analysis

Attack Distribution:

  • Map attacks by country of origin
  • Identify unusual geographic patterns
  • Correlate with global threat intelligence

Time Zone Patterns:

  • Attacks during business hours in attacker's region
  • Coordinated campaigns across time zones
  • Weekend vs weekday attack patterns

Trend Analysis

Attack Volume Trends:

  • Daily, weekly, monthly attack patterns
  • Seasonal variations in attack types
  • Correlation with security news or events

Target Evolution:

  • New pages being targeted
  • Shift in attack methodologies
  • Adaptation to your security measures

Export and Reporting

Export Formats

  • CSV: Spreadsheet analysis and reporting
  • JSON: Integration with security tools
  • PDF: Executive summaries and compliance reports
  • Raw Logs: Full detail for forensic analysis

Automated Reports

  • Daily Summaries: Attack volume and top threats
  • Weekly Trends: Pattern analysis and recommendations
  • Monthly Reports: Comprehensive security overview
  • Incident Reports: Detailed analysis of specific attacks

Integration Options

  • SIEM Systems: Real-time log streaming
  • Security Tools: API integration for automated analysis
  • Monitoring Platforms: Alert integration and dashboards
  • Compliance Systems: Automated compliance reporting

Analysis Best Practices

Regular Review Schedule

  • Daily: Check for new attack patterns and high-severity threats
  • Weekly: Analyze trends and adjust security settings
  • Monthly: Comprehensive review and rule optimization
  • Quarterly: Strategic security assessment and planning

Key Metrics to Track

  • Attack Volume: Total attacks per day/week/month
  • Attack Types: Distribution of different attack categories
  • Geographic Sources: Countries and regions of attack origins
  • Success Rate: Blocked vs potentially successful attacks

Documentation

  • Incident Records: Document significant attacks and responses
  • Pattern Analysis: Track recurring attack patterns
  • Rule Changes: Log security configuration modifications
  • Performance Impact: Monitor WAF processing overhead

Troubleshooting Analysis

No Logs Showing

  • Check time range: Expand date filters
  • Verify protection: Ensure site is actively protected
  • DNS verification: Confirm traffic flows through AtomicEdge
  • Rule status: Check if WAF rules are enabled

Too Many False Positives

  • Review blocked requests: Identify legitimate traffic
  • Adjust sensitivity: Lower protection levels if needed
  • Create exceptions: Whitelist trusted sources
  • Fine-tune rules: Customize rules for your application

Missing Expected Attacks

  • Rule coverage: Ensure appropriate rule sets are enabled
  • Protection level: Higher levels catch more subtle attacks
  • Custom rules: Add rules for application-specific threats
  • Rule updates: Ensure latest rule definitions are active

Need Help?

  • 💬 Live Chat: Get help with log analysis
  • 📧 Email Support: Send complex analysis questions
  • 🛡️ Managed Analysis: Expert log review service (Enterprise)