Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ sidebar:
order: 2
---

import { Render } from "~/components";

Once you [activate Page Shield](/page-shield/get-started/), the **Monitors** dashboard will show which resources (scripts and connections) are running on your domain, as well as the cookies recently detected in HTTP traffic.

If you notice unexpected scripts or connections on the dashboard, check them for signs of malicious activity. Enterprise customers with a paid add-on will have their [connections and scripts classified as potentially malicious](/page-shield/how-it-works/malicious-script-detection/) based on threat feeds. You should also check for any new or unexpected cookies.
Expand Down Expand Up @@ -54,15 +56,23 @@ You can filter the data in these dashboards using different criteria, and print
Only available to customers on Business and Enterprise plans.
:::

To view the details of an item, select **Details** next to the item.
To view the details of an item, select **Details** next to it.

### Script and connection details

The details of each connection or script include:

- **Last seen**: How long ago the resource was last detected (in the last 30 days).
- **First seen at**: The date and time when the resource was first detected.
- **Page URLs**: The most recent pages where the resource was detected (up to ten pages).
- **First page URL**: The page where the resource was first detected.
- **Host**: The host where the script is being loaded or the connection is being made.
- **Seen on host**: The host where the script is being loaded or the connection is being made.
- **Seen on pages**: The most recent pages where the resource was detected (up to ten pages).
- **First seen on**: The page where the resource was first detected.

The script details also include the last 10 script versions detected by Page Shield.

<Render file="scripts-hash-note" />

### Cookie details

The details of each cookie include:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,11 +6,11 @@ sidebar:
head: []
description: Learn how to review scripts and connections that Page Shield
considered malicious.

---

:::note
import { Render } from "~/components";

:::note
Only available to Enterprise customers with a paid add-on.
:::

Expand All @@ -26,10 +26,13 @@ To review the scripts considered malicious:

3. Select **Details** for each script considered malicious. The script details will contain:

* **Malicious Code**: Whether Cloudflare's internal systems consider the script malicious or not, and what is the score of the current script version (1-99).
* **Malicious URL**: Whether the script URL is known to be malicious according to threat intelligence feeds.
* **Malicious domain**: Whether the script's domain is known to be malicious according to threat intelligence feeds.
* **Malicious category**: The categorization of the script considered malicious according to threat intelligence feeds.
- **Malicious code analysis**: Scores between 1-99 classifying how malicious the current script version is, where 1 means definitely malicious and 99 means definitely not malicious.
- **Code behavior analysis**: Scores classifying the behavior of the current script version in terms of code obfuscation and data exfiltration. The scores vary between 1-99, where 1 means definitely malicious and 99 means definitely not malicious.
- **Threat intelligence**: Whether the script URL and/or domain is known to be malicious according to threat intelligence feeds. If the script is considered malicious according to the feeds, Page Shield will list the associated threat [categories](/page-shield/how-it-works/malicious-script-detection/#malicious-script-and-connection-categories). If threat intelligence feeds do not have any information about the script URL or domain, the dashboard will show **Not present**.

The script details also include the last 10 script versions detected by Page Shield.

<Render file="scripts-hash-note" />

For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).

Expand All @@ -47,9 +50,9 @@ To review the connections considered malicious:

3. Select **Details** for each connection considered malicious. The connection details will contain:

* **URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
* **Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
* **Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
- **URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
- **Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
- **Category**: The categorization of the connection considered malicious according to threat intelligence feeds.

For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).

Expand Down
7 changes: 7 additions & 0 deletions src/content/partials/page-shield/scripts-hash-note.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
---
{}
---

:::note
The **Hash** value shown in the script details for each script version is an internal identifier. This differs from the file content hash defined by [Subresource Integrity (SRI)](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity) that is required to be used in [Page Shield policies](/page-shield/policies/).
:::
Loading