Manual Chapter :
Configuring Leaked Credential Check
Applies To:
Show Versions
BIG-IP ASM
- 17.5.0, 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0
Configuring Leaked Credential Check
If you have not added the Leaked Credential Check
application to Cloud Services, configurations to Leaked Credentials Detection will not
be operational.
- On the Main tab, click.
- In theCurrent edited security policylist near the top of the screen, verify that the security policy shown is the one you want to work on.
- ClickCreate.The New Brute Force Protection Configuration page opens.
- In theLeaked Credentials Detectionsection, enableDetectionand select the detectionAction
- Alarm
- Alarm and Blocking Page (default)
- Alarm and Honeypot Page
- Alarm and Leaked Credentials Page
- ClickApply.