You are on page 1of 2

Creating IP address

exceptions.........................................................................
... 87
Deleting IP address
exceptions.........................................................................
....88
Updating IP address
exceptions.........................................................................
...89
Disallowing Application Use at Specific
Geolocations.........................................................91
Overview: Disallowing application use in certain
geolocations........................................ 91
Disallowing application use in certain
geolocations......................................................... 91
Setting up geolocation enforcement from a
request ....................................................... 92
Protecting Sensitive Data with Data
Guard............................................................................
93
About protecting sensitive data with Data
Guard............................................................. 93
Response headers that Data Guard
inspects.................................................................. 93
Protecting sensitive
data...............................................................................
...................93
Masking Credit Card Numbers in
Logs...............................................................................
....95
Overview: Masking credit card numbers in
logs...............................................................95
Masking credit card numbers in request
logs........................................................95
Displaying Reports and Monitoring
ASM...............................................................................
97
ASM Reporting
Tools..............................................................................
......................... 97
Displaying an application security overview
report.......................................................... 97
Analyzing requests with
violations.........................................................................
.......... 98
How to view a
request ...........................................................................
............... 99
Generating PCI Compliance
reports............................................................................
.. 100
Sample PCI Compliance
report...........................................................................10
1
Logging Application Security
Events.............................................................................
...... 103
About logging
profiles...........................................................................
......................... 103
How to use multiple logging
profiles...........................................................................
....103
Creating a logging profile for local
storage.....................................................................104
Setting up remote
logging............................................................................
.................. 105
Associating a logging profile with a security
policy........................................................ 106
About logging
responses..........................................................................
...........106
About ArcSight log message
format....................................................................107
About syslog request
format.............................................................................
...107
Filtering logging
information........................................................................
...................108
Viewing application security
logs...............................................................................
.... 109
Preventing Session Hijacking and Tracking User
Sessions...............................................111
Overview: Preventing session
hijacking.........................................................................
111
Preventing session
hijacking..........................................................................
..... 111
Configuring the response to cookie
hijacking......................................................112
Overview: Tracking user sessions using login
pages.....................................................112
Creating login pages
automatically.....................................................................
113
Creating login pages
manually...........................................................................
.113
Setting up session
tracking...........................................................................
...... 115
Monitoring user and session
information............................................................ 117
Tracking specific user and session
information................................................... 117
Overview: Tracking application security sessions using
APM........................................118
Creating a
VLAN...............................................................................
.................. 119
Creating a self IP address for a
VLAN................................................................ 120
Creating a local traffic pool for application
security ............................................

You might also like