Requests Analysis
Here you will find a breakdown of all authentication attempt requests flagged as compromised by Credential Intelligence and blocked by Bot Defender.
Important terms
Blocked by BD - requests that Bot Defender blocked*. Credentials from malicious requests will be collected into Credential Intelligence for protection. These credentials will be seen as "newly collected" on the corresponding credential timeline.
Blocked by BD and Flagged by CIÂ - requests that Bot Defender blocked and Credential Intelligence flagged as compromised.
Flagged by CIÂ - requests that Credential Intelligence flagged as compromised.
Not compromised - requests that weren't blocked or flagged as compromised by either Credential Intelligence or Bot Defender.
Failed login & authentication - requests that got a failed response from the server.
Passed login & authentication - requests that got a valid response from the server.
Authentication method: Password-based - requests that were detected with credentials and analyzed by Credential Intelligence.
Authentication method: Other - requests that didn't contain credentials and therefore weren't analyzed by Credential Intelligence. Please note, if this number is too high, it could mean there is a visibility issue. Please get in touch with us to review the integration.Â
Login & Authentication requests timeline
Here you will find a timeline of all authentication attempt requests at authentication endpoints. Anomalies in data are often credential-stuffing attacks.
Requests coverage pie
Here you will find a split of all authentication attempt requests by detection and mitigation, and by the authentication method.
*Please note, when the enforcement is in monitor mode, this metric will include requests flagged by Bot Defender, but not necessarily blocked.
To read about Credential Analysis, click here.
Updated 12 days ago