Manual Chapter : Overview

Applies To:

Show Versions Show Versions


  • 17.1.0, 17.0.0, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.0
Manual Chapter


You can create
Protection Logging profiles to log information on client attempts to login to the website protected by your
profile and to log information on
alerts sent by the BIG-IP system. Once the logging profile is properly configured, the BIG-IP system sends the
Protection logs to a third-party platform of your choice. The logging profile includes an option to create your own template to determine what information is included in the logs, or to use a default template. You can also set a rate-limit for the number of log messages that can be sent per second.
There are two main steps for setting up the logging profile, which are:
  1. Create the logging profile.
  2. Associate the logging profile with
    an anti-fraud