Overview
Application Security Management (ASM) provides observability into application-level attacks, and evaluates the conditions in which each trace was generated. ASM trace qualification then labels each attack as harmful or safe to help you take action on the most impactful attacks.
Filter by the Qualification facet in the ASM Traces Explorer to view the possible qualification results:
Qualification outcomes
ASM runs qualification rules (closed-source) on every trace. There are four possible qualification outcomes, as listed in the facet menu:
Qualification result | Description |
---|
Unknown | ASM has qualification rules for this attack, but did not have enough information to make a qualification decision. |
None successful | ASM determined that attacks in this trace were not harmful. |
Harmful | At least one attack in the trace was successful. |
No value | ASM does not have qualification rules for this type of attack. |
Trace sidepanel
The qualification result can also be seen when viewing the details of an individual trace.Example of a trace that ASM has qualified as safe:
Example of a trace that ASM has qualified as harmful:
Further Reading
Additional helpful documentation, links, and articles: