|
7 | 7 | label: Leaked credentials |
8 | 8 | --- |
9 | 9 |
|
| 10 | +import { Type } from "~/components"; |
| 11 | + |
10 | 12 | The leaked credentials [traffic detection](/waf/detections/) scans incoming requests for credentials (usernames and passwords) previously leaked from [data breaches](https://www.cloudflare.com/learning/security/what-is-a-data-breach/). |
11 | 13 |
|
12 | 14 | :::note |
@@ -96,13 +98,13 @@ For instructions on configuring a custom detection location, refer to [Get start |
96 | 98 |
|
97 | 99 | ## Leaked credentials fields |
98 | 100 |
|
99 | | -| Field name in the dashboard | Field | Availability | |
100 | | -| --------------------------- | ----------------------------------------------------------- | ------------------ | |
101 | | -| Password Leaked | [`cf.waf.credential_check.password_leaked`][1] | All plans | |
102 | | -| User and Password Leaked | [`cf.waf.credential_check.username_and_password_leaked`][2] | Pro plan and above | |
103 | | -| Username Leaked | [`cf.waf.credential_check.username_leaked`][3] | Enterprise plan | |
104 | | -| Similar Password Leaked | [`cf.waf.credential_check.username_password_similar`][4] | Enterprise plan | |
105 | | -| Authentication detected | [`cf.waf.auth_detected`][5] | Enterprise plan | |
| 101 | +| Field | Required plan | Description | |
| 102 | +| ------------------------------------------------------------------------------------------------------------------------ | --------------- | ---------------------------------------------------------------------------------------------------------------------------- | |
| 103 | +| Password Leaked <br/> [`cf.waf.credential_check.password_leaked`][1] <br/> <Type text="Boolean" /> | N/A (all plans) | Indicates whether the password detected in the request was previously leaked. | |
| 104 | +| User and Password Leaked <br/> [`cf.waf.credential_check.username_and_password_leaked`][2] <br/> <Type text="Boolean" /> | Pro and above | Indicates whether the (username-password pair detected in the request were previously leaked. | |
| 105 | +| Username Leaked <br/> [`cf.waf.credential_check.username_leaked`][3] <br/> <Type text="Boolean" /> | Enterprise | Indicates whether the username detected in the request was previously leaked. | |
| 106 | +| Similar Password Leaked <br/> [`cf.waf.credential_check.username_password_similar`][4] <br/> <Type text="Boolean" /> | Enterprise | Indicates whether a similar version of the username and password credentials detected in the request were previously leaked. | |
| 107 | +| Authentication detected <br/> [`cf.waf.auth_detected`][5] <br/> <Type text="Boolean" /> | Enterprise | Indicates whether Cloudflare detected authentication credentials in the request. | |
106 | 108 |
|
107 | 109 | [1]: /ruleset-engine/rules-language/fields/reference/cf.waf.credential_check.password_leaked/ |
108 | 110 | [2]: /ruleset-engine/rules-language/fields/reference/cf.waf.credential_check.username_and_password_leaked/ |
|
0 commit comments