STRATEGIC BUSINESS PARTNERS

Platin Bilişim has cooperations with the strongest and leader brands. Our target is not only make a difference on our rivals via our certificated and powerful engineer staff but also; providing IT security products and services for our customers from end to end.

F5 Networks Logging and Graphics

To log requests over ASM, a new log profile must be created by entering logging profiles under Event logs in the Application Security section.

There should be a new log profile created with going into logging profiles part that is located under Event logs and inside Application Security part. This log profile should be generated for logging requests that goes over ASM. There are some choices like logging both requests and responses, all requests or only illegal requests.

 

These all logged requests are showed under event logs part.

There is also an option exists that provides sending received request and graphics of occurred illegal movements to the administrator via e-mail. Chart Schedular is going to be selected and timing chart is created which appears under Application Security and Reporting part.