Requests Analysis

Here you will find a breakdown of all authentication attempt requests flagged as compromised by Credential Intelligence and blocked by Bot Defender.

Important terms

Blocked by BD - requests that Bot Defender blocked*. Credentials from malicious requests will be collected into Credential Intelligence for protection. These credentials will be seen as "newly collected" on the corresponding credential timeline.

Blocked by BD and Flagged by CI - requests that Bot Defender blocked and Credential Intelligence flagged as compromised.

Flagged by CI - requests that Credential Intelligence flagged as compromised.

Not compromised - requests that weren't blocked or flagged as compromised by either Credential Intelligence or Bot Defender.

Failed login & authentication - requests that got a failed response from the server.

Passed login & authentication - requests that got a valid response from the server.

Authentication method: Password-based - requests that were detected with credentials and analyzed by Credential Intelligence.

Authentication method: Other - requests that didn't contain credentials and therefore weren't analyzed by Credential Intelligence. Please note, if this number is too high, it could mean there is a visibility issue. Please get in touch with us to review the integration. 

Login & Authentication requests timeline

Here you will find a timeline of all authentication attempt requests at authentication endpoints. Anomalies in data are often credential-stuffing attacks.

Requests coverage pie

Here you will find a split of all authentication attempt requests by detection and mitigation, and by the authentication method.

*Please note, when the enforcement is in monitor mode, this metric will include requests flagged by Bot Defender, but not necessarily blocked.

📘

To read about Credential Analysis, click here.