Skip to content

SECURITY LOG

Security Log Screen


Item Description
Elastic / DB Select the log search target. (Default: Elastic)
Items Customize the columns displayed in the log table.
Real Time Turn real-time log monitoring ON/OFF.
Search Conditions Search for desired logs by combining various filters.
Search Search logs based on the set conditions. (If no condition is set, searches all logs)
Download Download the current searched log list as a CSV file.
AI Comment Utilizes ChatGPT API to analyze whether the detection log is a true positive/false positive and identify the attack technique.

AI Comment

Through deep analysis of detection logs using AI (ChatGPT), you can determine whether a log is a real threat (true positive) or a false positive and receive detailed attack type information.

To use this feature, you must first register an API Key in the [MANAGEMENT] > [SETTINGS] > [AI API KEY UPDATE] menu.

Once the API Key registration is complete, the AI Comment icon will become active on the [LOG] > [SECURITY LOG] > [Log Details] screen.


Detection logs can be classified and viewed based on various criteria such as company, domain group, domain, risk, action, detection type, pattern group, URL, attacker IP, country, and period. Selecting the top-level 'Company' allows you to view all logs of subordinate domain groups in an integrated manner.


The main display items in the detection log list are as follows:

Item Description
NO Displays a unique detection log number.
DATE Displays the exact date and time the detection log occurred.
STATE Displays the country based on the GeoIP information of the attacker's IP.
ATTACKER Displays the attacker's IP address.
TARGET Displays the IP address of the target server that was attacked.
COMPANY Displays the company to which the target belongs.
DOMAIN Grp. Displays the domain group to which the target belongs.
RISK Displays the severity (risk level) of the detected threat.
DETECTION TYPE Displays the type of threat (e.g., SQL Injection, XSS, etc.).
PATTERN Grp. Displays the name of the group to which the detected pattern belongs.
PATTERN Displays the name of the pattern actually used for detection.
ACTION Displays the action taken upon threat detection (Block, Detect, etc.).
URL Displays the URL path of the web page where the attack was attempted.
PARAMETER In case of parameter-based attacks, displays the problematic parameter name.
DETECTION Msg. Displays detailed detection content or payload.

Search Detection Logs

[LOG] > [SECURITY LOG] > [SEARCH CONDITIONS] > [SEARCH]

You can precisely search for specific logs by combining various conditions.

Detection Log Search Conditions

The main search conditions are as follows:

Item Description
Search Period Set the log inquiry period.
COMPANY Search only logs of a specific company.
DOMAIN Grp. Search only logs of a specific domain group.
DOMAIN Search only logs of a specific domain.
ACTION Filter logs by threat response method.
NONE: Policy not applied
ALLOW: Allow (Skip next policy check)
DENY: Block (Skip next policy check)
REDIRECT: Redirect to block page
DETECT: Detect (Record log only and proceed to next policy check)
MASK: Mask ('') the string matching the pattern
BYPASS*: Skip all security checks (Exception handling)
RISK Search by risk level (High/Medium/Low).
No. Search by specific log number or number range.
ATTACKER IP Search by specific attacker IP range.
TARGET IP Search by victim server IP range.
URL Search for logs containing a specific URL path.
DETECTION Msg. Search for logs containing a specific string in the detection content (payload).
STATE Search for logs originating from a specific country.
TYPE / PATTERN GRP. / PATTERN Search by detailed classification criteria such as detection type, pattern group, and pattern name.

View Real-time Detection Logs

[LOG] > [SECURITY LOG] > [REAL TIME]

Clicking the [REAL TIME] button activates real-time monitoring mode, automatically updating the log list whenever a new threat is detected. (The button turns red when activated)
※ Past log search functions are restricted in real-time mode.

View Detection Log Details

[LOG] > [SECURITY LOG] > [Click Log List]

Clicking a specific row in the log list displays a detailed information panel on the right side of the screen.

Log Details (Right Panel)

View Detection Log Details (Popup)

[LOG] > [SECURITY LOG] > [Double-click Log Number]

Double-clicking the number in the log list allows you to view detailed information in a separate larger popup window.

Log Details (Popup)

View Detection Log Details (Modal Popup)

[LOG] > [SECURITY LOG] > [Click Log] > Click [Detail Icon] on Right Panel

Clicking the [View Detail] icon (Log Detail View Icon) on the right detail panel allows you to check full information including raw data in a modal popup.

Log Details (Modal Popup)

Check Raw Data and Exception Handling

The log detail screen allows you to check the raw data (up to 1KB) of the detected URL, facilitating attack analysis.

Attack Log Detail Info View

You can perform immediate exception handling via the context menu that appears when right-clicking on the log list.

Attack Log Exception Handling

Item Description
Exclude/Add from Search Results Adds or excludes the condition of the log to/from the search filter and re-searches.
Allow Pattern Adds an exception for the detected pattern to allow it. (False positive response)
Register White/Blacklist Immediately registers the attacker IP to the whitelist (Allow) or blacklist (Block).