Personal Information | Use | Legal Basis |
Log Data (Access Log: source IP, access URL, Query, Referrer, Cookie, User-Agent, X-Forwarder-For, WAF response code, source site response code, body) | We use this information to ensure the Service functions as required and to ensure that bugs are detected and remediated. | We process this information as it’s necessary for us to perform our contract with you to provide the Services. |
Log Data (Attack Log: domain name, attack type, number of aggregated attacks, attack source IP, hit rule ID, hit rule name, request method, risk level, attack time, matching source, execution action, request URL, attack content) | We use this information to ensure the Service functions as required and to ensure that bugs are detected and remediated. | We process this information as it’s necessary for us to perform our contract with you to provide the Services. |
Personal Information | Retention Policy |
Log Data | Up to 6 months (depending on your chosen configuration). |
Was this page helpful?