This Feature is available to users globally.
We will use the information in the following ways and in accordance with the following legal bases:
|Personal Information||Use||Legal Basis|
|Log Data (Access Log: source IP, access URL, Query, Referrer, Cookie, User-Agent, X-Forwarder-For, WAF response code, source site response code, body)||We use this information to ensure the Service functions as required and to ensure that bugs are detected and remediated.||We process this information as it’s necessary for us to perform our contract with you to provide the Services.|
|Log Data (Attack Log: domain name, attack type, number of aggregated attacks, attack source IP, hit rule ID, hit rule name, request method, risk level, attack time, matching source, execution action, request URL, attack content)||We use this information to ensure the Service functions as required and to ensure that bugs are detected and remediated.||We process this information as it’s necessary for us to perform our contract with you to provide the Services.|
We will retain personal information in accordance with the following:
|Personal Information||Retention Policy|
|Log Data||Up to 6 months (depending on your chosen configuration).|
Contact our sales team or business advisors to help your business.
Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.
Was this page helpful?