Working with false attacks¶
What is a false positive?¶
False positive occurs when attack signs are detected in the legitimate request.
After analyzing an attack, you may conclude that all or some requests in this attack are false positives. To prevent the WAF node from recognizing such requests as attacks in future traffic analysis, you can mark several requests or the entire attack as a false positive.
How a false positive mark works?¶
If a false positive mark is added for the attack of the type different from Information Exposure, the rule disabling analysis of the same requests for detected attack signs (tokens) is automatically created.
If a false positive mark is added for the incident with the Information Exposure attack type, the rule disabling analysis of the same requests for detected vulnerability signs is automatically created.
Created rule is applied when analyzing requests to the protected application. The rule is not displayed in the Wallarm Console and can be changed or removed only by the request sent to Wallarm technical support.
Mark a hit as a false positive¶
To mark one request (hit) as a false positive:
Select an attack in the Events section.
Collapse the list of requests in this attack.
Define a valid request and click False in the Actions column.
Mark an attack as a false positive¶
To mark all requests (hits) in the attack as false positives:
Select an attack with valid requests in the Events section.
Click Report attack as false positive.
If all the requests in the attack are marked as false positives, then the information about that attack will look like this:
Remove a false positive mark¶
To remove a false positive mark from the hit or attack, please send a request to Wallarm technical support. Also, you can undo a false positive mark in the dialog box in the Wallarm Console within a few seconds after the mark was applied.