Wallarm User Acceptance Testing Checklist¶
This section provides you with a checklist to ensure your Wallarm instance operates correctly.
Operation | Expected behavior | Check |
---|---|---|
Wallarm node detects attacks | Attacks are detected | |
You can log into the Wallarm interface | You can log in | |
Wallarm interface shows requests per second | You see the requests stats | |
Wallarm marks requests as false and stops blocking them | Wallarm does not block the requests | |
Wallarm detects vulnerabilities and creates security incidents | Security incidents are created | |
Wallarm detects perimeter | Scope is discovered | |
IP allowlisting, denylisting, and graylisting work | IP addresses are blocked | |
Users can be configured and have proper access rights | Users can be created and updated | |
User activity log has records | The log has records | |
Reporting works | You receive reports |
Wallarm Node Detects Attacks¶
- Send a malicious request to your resource:
- Run the following command to check if the attack count increased:
See also Checking the filter node operation
You Can Log into the Wallarm Interface¶
-
Proceed to the link that corresponds to the cloud you are using:
- If you are using the US cloud, proceed to the https://us1.my.wallarm.com link.
- If you are using the EU cloud, proceed to the https://my.wallarm.com/ link.
-
See if you can log in successfully.
See also the Threat Prevention Dashboard overview.
Wallarm Interface Shows Requests per Second¶
- Send a request to your resource:
Or send several requests with a bash script:
This example is for 10 requests.
- Check if the Wallarm interface shows detected requests per second.
See also the Threat Prevention Dashboard.
Wallarm Marks Requests as False and Stops Blocking them¶
-
Expand an attack on the Attacks tab.
-
Select a hit and click False.
-
Wait for around 3 minutes.
-
Resend the request and check if Wallarm detects it as an attack and blocks it.
See also Working with false attacks.
Wallarm Detects Vulnerabilities and Creates Security Incidents¶
-
Ensure you have an open vulnerability on your resource.
-
Send a malicious request to exploit the vulnerability.
-
Check if there is an incident detected in the Wallarm interface.
See Checking Incidents.
Wallarm Detects Perimeter¶
-
On the Scanner tab, add your resource's domain.
-
Check if Wallarm discovers all resources associated with the added domain.
See also Working with the scanner.
IP allowlisting, denylisting, and graylisting work¶
-
Learn core logic of IP lists.
-
Check that the filtering node correctly processes requests originated from IPs added to the lists.
Users Can Be Configured and Have Proper Access Rights¶
-
Ensure you have the Administrator role in the Wallarm system.
-
Create, change role, disable, and delete a user as described in Configuring users.
See also Configuring users.
User Activity Log Has Records¶
-
Go to Settings –> Users.
-
Check that User Activity Log has records.
See also User activity log.
Reporting Works¶
-
On the Attacks tab, put in a search query.
-
Click the report button on the right.
-
Put in your email and click the report button again.
-
Check if you receive the report.
See also Creating a custom report.