Forum Discussion
royceking_18057
May 06, 2015Cirrus
I actually am not sure if it is the request log or the event log. I get there by going to Security > Application Security > Policy Building > Manual Traffic learning. Then I click on one of the Traffic Learning violations, like "Attack signature detected". This then shows all the signature violations. I choose one and click the number under "Recent incidents" which brings up a pop up with all the violations for that signature. When clicking on one of the URLs that is shown in violation, and going to "Full Request" the post payload is displayed in the window. That is where the sensitive parameters are exposed.
How do I mask those without having to enter each parameter?