The Artifakt WAF offers several types of protections for your web application:
Prevents attacks caused by HTTP, UDP, TCP and QUIC floods.
OWASP Core Ruleset provides protection against common attack categories, including SQL Injection, Web trojans and Cross-Site Scripting.
Prevents well known malicious or bad bots to crawl your website.
Custom Firewall rules designed to provide fast and performant protection for your web applications such as Magento, Drupal or Wordpress.
In order to determine the behavior to be applied to the traffic, a score is automatically applied to each request according to their nature, origin, type of traffic. As this score exceeds the vigilance threshold, 3 different types of WAF actions can be triggered:
The request has triggered a Firewall rule or we know for sure the request is a malicious attack. Artifakt WAF blocks this request.
The request demonstrated previous suspicious activity online or we don't know for sure the request is malicious. Artifakt WAF displays a CAPTCHA.
The request is not suspicious enough to trigger a verification mechanism, but potentially deserves your attention. Artifakt WAF logs the request.
To access data and logs returned by the WAF, navigate to Environment → Monitoring → WAF.
The data could be filtered by:
Type (Block, Challenge ou Log)
The graph as well as the table of events will automatically update according to the filters selected.