FortiADC
FortiADC enhances the scalability, performance, and security of your applications whether they are hosted on premises or in the cloud.
Khidzir_MN
Staff
Staff
Article Id 301738
Description This article describes how to enable the respective FortiADC Security Log (WAF) to show the respective matched pattern or string that triggers the respective security violation. It may be necessary to preconfigure the WAF Profile and refer to the documentation at the end of this article for more information on configuring the WAF Profile.
Scope FortiADC and FortiADC-VM.
Solution

The option to view the respective matched pattern or string is disabled (default) in the respective WAF Profile.

 

This option can be enabled with the below steps:

 

  1. Go to Web Application Firewall -> WAF Profile.
  2. Select and edit the respective WAF Profile.
  3. Toggle the button next to the 'Rule Match Record' option.

 

enable_option.png

 

  1. Select Save at the bottom of the page to save the changes.

     

Review the respective Security Log (Log&Report -> Security Log (WAF)).

 

  1. Sample log with the 'Rule Match Record' option disabled.

 

log_no_matched.png

 

  1. Sample log with the 'Rule Match Record' option enabled.

     

    log_matched.png

     

    Note that it is advisable to enable the 'Rule Match Record' option only during troubleshooting or for a temporary period as it may increase the system resource usage.


    Refer to the below documentation for more information on the WAF Profile:
    Configuring a WAF Profile