You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/page-shield/detection/monitor-connections-scripts.mdx
+14-4Lines changed: 14 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,8 @@ sidebar:
5
5
order: 2
6
6
---
7
7
8
+
import { Render } from"~/components";
9
+
8
10
Once you [activate Page Shield](/page-shield/get-started/), the **Monitors** dashboard will show which resources (scripts and connections) are running on your domain, as well as the cookies recently detected in HTTP traffic.
9
11
10
12
If you notice unexpected scripts or connections on the dashboard, check them for signs of malicious activity. Enterprise customers with a paid add-on will have their [connections and scripts classified as potentially malicious](/page-shield/how-it-works/malicious-script-detection/) based on threat feeds. You should also check for any new or unexpected cookies.
@@ -54,15 +56,23 @@ You can filter the data in these dashboards using different criteria, and print
54
56
Only available to customers on Business and Enterprise plans.
55
57
:::
56
58
57
-
To view the details of an item, select **Details** next to the item.
59
+
To view the details of an item, select **Details** next to it.
60
+
61
+
### Script and connection details
58
62
59
63
The details of each connection or script include:
60
64
61
65
-**Last seen**: How long ago the resource was last detected (in the last 30 days).
62
66
-**First seen at**: The date and time when the resource was first detected.
63
-
-**Page URLs**: The most recent pages where the resource was detected (up to ten pages).
64
-
-**First page URL**: The page where the resource was first detected.
65
-
-**Host**: The host where the script is being loaded or the connection is being made.
67
+
-**Seen on host**: The host where the script is being loaded or the connection is being made.
68
+
-**Seen on pages**: The most recent pages where the resource was detected (up to ten pages).
69
+
-**First seen on**: The page where the resource was first detected.
70
+
71
+
The script details also include the last 10 script versions detected by Page Shield.
Copy file name to clipboardExpand all lines: src/content/docs/page-shield/detection/review-malicious-scripts.mdx
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,11 @@ sidebar:
6
6
head: []
7
7
description: Learn how to review scripts and connections that Page Shield
8
8
considered malicious.
9
-
10
9
---
11
10
12
-
:::note
11
+
import { Render } from"~/components";
13
12
13
+
:::note
14
14
Only available to Enterprise customers with a paid add-on.
15
15
:::
16
16
@@ -26,10 +26,13 @@ To review the scripts considered malicious:
26
26
27
27
3. Select **Details** for each script considered malicious. The script details will contain:
28
28
29
-
***Malicious Code**: Whether Cloudflare's internal systems consider the script malicious or not, and what is the score of the current script version (1-99).
30
-
***Malicious URL**: Whether the script URL is known to be malicious according to threat intelligence feeds.
31
-
***Malicious domain**: Whether the script's domain is known to be malicious according to threat intelligence feeds.
32
-
***Malicious category**: The categorization of the script considered malicious according to threat intelligence feeds.
29
+
-**Malicious code analysis**: Scores between 1-99 classifying how malicious the current script version is, where 1 means definitely malicious and 99 means definitely not malicious.
30
+
-**Code behavior analysis**: Scores classifying the behavior of the current script version in terms of code obfuscation and data exfiltration. The scores vary between 1-99, where 1 means definitely malicious and 99 means definitely not malicious.
31
+
-**Threat intelligence**: Whether the script URL and/or domain is known to be malicious according to threat intelligence feeds. If the script is considered malicious according to the feeds, Page Shield will list the associated threat [categories](/page-shield/how-it-works/malicious-script-detection/#malicious-script-and-connection-categories). If threat intelligence feeds do not have any information about the script URL or domain, the dashboard will show **Not present**.
32
+
33
+
The script details also include the last 10 script versions detected by Page Shield.
34
+
35
+
<Renderfile="scripts-hash-note" />
33
36
34
37
For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
35
38
@@ -47,9 +50,9 @@ To review the connections considered malicious:
47
50
48
51
3. Select **Details** for each connection considered malicious. The connection details will contain:
49
52
50
-
***URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
51
-
***Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
52
-
***Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
53
+
-**URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
54
+
-**Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
55
+
-**Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
53
56
54
57
For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
The **Hash** value shown in the script details for each script version is an internal identifier that may change in the near future. Do not use this hash in [Page Shield policies](/page-shield/policies/).
0 commit comments