Manual Chapter : Configuring Leaked Credential Check

Applies To:

Show Versions Show Versions

BIG-IP ASM

  • 17.5.0, 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0
Manual Chapter

Configuring Leaked Credential Check

If you have not added the Leaked Credential Check application to Cloud Services, configurations to Leaked Credentials Detection will not be operational.
  1. On the Main tab, click
    Security
    Application Security
    Brute Force Attack Prevention
    .
  2. In the
    Current edited security policy
    list near the top of the screen, verify that the security policy shown is the one you want to work on.
  3. Click
    Create
    .
    The New Brute Force Protection Configuration page opens.
  4. In the
    Leaked Credentials Detection
    section, enable
    Detection
    and select the detection
    Action
    1. Alarm
    2. Alarm and Blocking Page (default)
    3. Alarm and Honeypot Page
    4. Alarm and Leaked Credentials Page
  5. Click
    Apply
    .