Skip to content

CSD Console Walkthrough

Navigate to the Client-Side Defense dashboard in the XC Console.

CSD Dashboard showing summary cards and domain table

The summary cards show actioned script domains:

  • Action Needed — script domains (both first-party and third-party) flagged for review but not yet actioned
  • Found & Mitigated — domains where scripts have been added to the mitigate list (only changes after admin action)
  • Found & Allowed — domains explicitly added to the allow list (only changes after admin action)
  • Total Found — all script domains detected in the current period (updates automatically with new detections)
  • Transactions Consumed — CSD telemetry events processed this month (confirms CSD is active)

The domain table lists all domains that CSD has detected — including both first-party and third-party script source domains, as well as fetch/XHR destination domains. Each row shows the domain status, last seen timestamp, domain category, and the locations (URLs) where activity from that domain was observed.

The screenshot above shows domains detected on the demo tenant, all in Action Needed status. The specific domains visible depend on which simulations have been run:

DomainCategoryOrigin
botdemo.sales-demo.f5demos.comComputer and Internet InfoProtected application domain
dnslog.cnMalware SitesData-exfiltration simulation script
canarytokens.comComputer and Internet SecurityData-exfiltration simulation script

After running the combined simulation and actioning the injected CDN domains (cdn.jsdelivr.net, esm.sh, unpkg.com, ga.jspm.io) via the actions menu, those domains will also appear in the table with Found & Allowed or Found & Mitigated status.

Click the actions menu on a domain row to see available actions: Add To Allow List and Add To Mitigate List.

Dashboard actions menu showing Allow and Mitigate options

Open the Script List from the left navigation to view all detected scripts.

Script List showing detected scripts
FieldDescription
Script NameFull URL of the JavaScript file
StatusAN (Action Needed) or NA (No Action Needed)
Risk LevelNo Risk, Low Risk, or High Risk
JustificationWhy CSD flagged the script
Last SeenMost recent detection timestamp
Locations FoundNumber of pages where the script was observed
Network InteractionsCount of network calls made by the script
Form FieldsNumber of form fields the script reads
Affected ClientsNumber of unique users/sessions affected by the script

After running the combined simulation, you should see:

  • Application scripts (e.g., main.js, vendor.js) flagged as High Risk / Action Needed because they read sensitive form fields (email, password)
  • 4 new third-party scripts from cdn.jsdelivr.net, esm.sh, unpkg.com, and ga.jspm.io appearing as new entries in the list
  1. Sort by Risk Level (High Risk first)

  2. Click a high-risk script (e.g., main.js) to view its detail page

  3. The Overview tab shows a Behaviors Over Time chart tracking the script’s risk level, source domain, and type over time

    Script detail page showing Behaviors Over Time chart
  4. Click the Form Fields tab to see which specific fields the script is reading

  5. Click the Affected Users tab to see which users were impacted (see the Affected Users section below)

The Form Fields view shows all form fields that CSD detected scripts reading across the monitored site.

Form Fields view with sensitivity classification

CSD automatically classifies fields by sensitivity:

Form FieldAnalysisDescription
emailSensitive (by system)Login email field — high risk if read by unauthorized scripts
passwordSensitive (by system)Login password field — high risk if read by unauthorized scripts

Each field shows the number of associated scripts reading it, locations where reads were observed, and the last read timestamp. Drill into a field to see exactly which scripts are accessing it.

Open the Network view to see all domains that scripts load from (not fetch/XHR destinations).

Network All Domains view

The All Domains tab lists each domain with:

  • Last Seen timestamp
  • Domain Category (e.g., Computer and Internet Info)
  • Added to Allow/Mitigate List status (Unlisted, Allowed, or Mitigated)

After running the combined simulation, the same four CDN domains listed in the Dashboard section should appear as new entries because the injected <script> tags loaded JavaScript from these CDNs.

Use the Mitigate List and Allow List tabs to review domains that have already been actioned.

The Affected Users tab (accessible from a script’s detail page) shows users impacted by the selected script.

Affected Users tab showing impacted users

Each entry includes:

FieldDescription
IP AddressSource IP of the affected user
Device IDUnique device identifier hash
GeolocationCountry derived from the IP (shown with flag icon)
ChannelAccess channel (e.g., Web)
User AgentBrowser name, version, and operating system
Last SeenMost recent detection timestamp for this user

This view demonstrates the scope of a detected attack — how many users were exposed, from which locations, and on which platforms. Use this data to assess the impact of a formjacking incident and prioritize mitigation.

Open the Notifications section from the left navigation to view the Alerts page.

CSD Notifications UI showing the Alerts page on the f5-sales-demo tenant

The Alerts page displays platform and CSD alerts for the namespace. Infrastructure alerts (such as endpoint healthcheck failures) appear automatically, but CSD-specific alert rules must be explicitly configured by an admin before script-detection notifications fire. Configurable trigger conditions include:

  • New suspicious script domain detected
  • Script risk score exceeds threshold
  • New script detected on a monitored page
  • Script behavior change (e.g., new form field reads)

Alerts can be scoped per-domain or globally, and email notifications are sent to the configured alert receiver.

From the Dashboard, click the actions menu on a flagged domain and select Add To Mitigate List. Alternatively, from the Script List, use the actions on individual scripts.

  1. Select a suspicious domain or script
  2. Click Add To Mitigate List
  3. Confirm the action — the domain status updates in the Actions column
  4. The domain moves from Action Needed to Found & Mitigated

The actions menu is the same one shown in the Dashboard section above.

Mitigated scripts are blocked from executing on the next page load. Mitigation is reversible — removing the domain from the Mitigate List restores script execution.

For programmatic mitigation via the API, see API Reference — Mitigation.