Skip to content

Wallarm User Acceptance Testing Checklist

This section provides you with a checklist to ensure your Wallarm instance operates correctly.

Operation Expected behavior Check
Wallarm node detects attacks Attacks are detected
You can log into the Wallarm interface You can log in
Wallarm interface shows requests per second You see the requests stats
Wallarm marks requests as false and stops blocking them Wallarm does not block the requests
Wallarm detects vulnerabilities and creates security incidents Security incidents are created
Wallarm detects perimeter Scope is discovered
IP allowlisting, denylisting, and graylisting work IP addresses are blocked
Users can be configured and have proper access rights Users can be created and updated
User activity log has records The log has records
Reporting works You receive reports

Wallarm Node Detects Attacks

  1. Send a malicious request to your resource:
  1. Run the following command to check if the attack count increased:

See also Checking the filter node operation

You Can Log into the Wallarm Interface

  1. Proceed to the link that corresponds to the cloud you are using:

  2. See if you can log in successfully.

See also the Threat Prevention Dashboard overview.

Wallarm Interface Shows Requests per Second

  1. Send a request to your resource:
curl http://<resource_URL>

Or send several requests with a bash script:

for (( i=0 ; $i<10 ; i++ )) ;
   curl http://<resource_URL> ;

This example is for 10 requests.

  1. Check if the Wallarm interface shows detected requests per second.

See also the Threat Prevention Dashboard.

Wallarm Marks Requests as False and Stops Blocking them

  1. Expand an attack on the Attacks tab.

  2. Select a hit and click False.

  3. Wait for around 3 minutes.

  4. Resend the request and check if Wallarm detects it as an attack and blocks it.

See also Working with false attacks.

Wallarm Detects Vulnerabilities and Creates Security Incidents

  1. Ensure you have an open vulnerability on your resource.

  2. Send a malicious request to exploit the vulnerability.

  3. Check if there is an incident detected in the Wallarm interface.

See Checking Incidents.

Wallarm Detects Perimeter

  1. On the Scanner tab, add your resource's domain.

  2. Check if Wallarm discovers all resources associated with the added domain.

See also Working with the scanner.

IP allowlisting, denylisting, and graylisting work

  1. Learn core logic of IP lists.

  2. Add IP addresses to the allowlist, denylist, and graylist.

  3. Check that the filtering node correctly processes requests originated from IPs added to the lists.

Users Can Be Configured and Have Proper Access Rights

  1. Ensure you have the Administrator role in the Wallarm system.

  2. Create, change role, disable, and delete a user as described in Configuring users.

See also Configuring users.

User Activity Log Has Records

  1. Go to Settings –> Users.

  2. Check that User Activity Log has records.

See also User activity log.

Reporting Works

  1. On the Attacks tab, put in a search query.

  2. Click the report button on the right.

  3. Put in your email and click the report button again.

  4. Check if you receive the report.

See also Creating a custom report.