On this page, you can view SiteWALL logs for your applications.
Log in to the SiteWALL Management Portal.
In the sidebar, click on "Log Search".
Use the available filters to customize your search:
Select the duration for which you want to view the logs.
Choose a specific application if you want to filter logs by application.
Select an action (All, Allowed, blocked) based on your investigation or monitoring needs.
Using Advanced Filters in Log Search
The Advanced Filters feature in SiteWALL Log Search allows you to perform a more detailed and customized log analysis based on specific parameters.
Steps to Use Log Search with Advanced Filters:
Log in to the SiteWALL Management Portal.
In the sidebar, click on "Log Search".
Click on "Advanced Filters" to refine your search criteria.
You can apply the following filters to narrow down your log results:
Duration: Select the time range for which you want to view the logs.
Application: Select a specific application to view logs related to that application, or set to All to include logs from all applications, based on your requirement.
Action: Select the type of action, such as All, Allowed, or Blocked, based on your investigation needs.
Source IP: Enter a specific source IP address to view logs related to traffic from that IP.
Rule ID: Input a specific Rule ID to find logs triggered by that rule.
Threat Name: If known, select the Threat Name to view associated logs.
Transaction ID:
If a request to your application was blocked and a SiteWALL block page was shown, you will find a Transaction ID on that page.
Copy the Transaction ID and paste it into the Log Search. This helps identify the exact reason for the block.
Country: Filter logs by selecting a specific country to view traffic originating from that region.
Response Code: Use this filter to view logs based on specific HTTP response codes (e.g., 200, 403, 500). You can refine your search using the following matching options:
Select All – View logs for all response codes.
Is – View logs that match a specific response code.
Is Not – Exclude logs with a specific response code.
Range – View logs within a defined range of response codes.
Is Not in Range – Exclude logs within a specific range of response codes.
This helps you isolate traffic behavior and troubleshoot application responses more effectively.
These filters help you pinpoint relevant logs quickly, making your threat investigation and application monitoring more efficient.
Additionally, you can download the log file by clicking the Download button available on the same page.