Skip to content

FAQ

Frequently asked questions about F5 Distributed Cloud Client-Side Defense, compiled from demo sessions and customer conversations.

Does CSD generate alerts when violations are detected?

Section titled “Does CSD generate alerts when violations are detected?”

Yes, but CSD-specific alert rules must be explicitly configured. CSD auto-creates an Alert Receiver using the account email address provided during setup. You can configure alert triggers for:

  • New suspicious domain detected
  • Risk score threshold exceeded
  • New script detected on a protected page
  • Behavior change on a previously seen script

Alerts can be scoped per-domain or applied globally across all protected domains. See the CSD Console — Alert Configuration section for setup details.

Can I view HTTP request logs for CSD events?

Section titled “Can I view HTTP request logs for CSD events?”

CSD operates via client-side JavaScript telemetry — there are no server-side HTTP logs for script detections or mitigation enforcement. The detection pipeline works as follows:

  1. The CSD JavaScript tag (injected by the load balancer) runs in the visitor’s browser
  2. It monitors script loading, DOM mutations, and form field access
  3. Telemetry beacons are sent to the F5 backend for analysis
  4. Detection results appear in the CSD API and dashboard

The load balancer access logs (/api/data/namespaces/\{ns\}/access_logs) include a csd_js_injection field that confirms whether the CSD script tag was injected into a response. For CSD detection data, use the API endpoints: /scripts, /detected_domains, and /formFields.

See the Diagnostics guide for the full Layer 7 (HTTP) and Layer 8 (CSD telemetry) verification tests.

Does CSD integrate with SIEM tools (Splunk, Datadog, etc.)?

Section titled “Does CSD integrate with SIEM tools (Splunk, Datadog, etc.)?”

No native SIEM webhook or syslog integration is documented for CSD specifically. The CSD detection data is available through the REST API endpoints:

  • /scripts — detected scripts with risk levels
  • /detected_domains — categorized domains (CDN, exfil, etc.)
  • /formFields — form fields accessed by scripts with sensitivity classification

Customers can poll these API endpoints on a schedule and forward detection data to their SIEM. See the API Reference for endpoint details and authentication.

CSD mitigation blocks <script> tag loading from mitigated domains by intercepting the src attribute — the CSD JavaScript clears the src to an empty string, preventing the network request entirely. This targets the supply-chain vector: malicious third-party scripts that are injected into the page via <script> tags.

CSD mitigation does not intercept:

  • fetch() calls
  • XMLHttpRequest calls
  • <img> or <link> tag loads
  • WebSocket connections

This design is intentional — CSD focuses on the script loading mechanism that supply-chain attacks (Magecart, formjacking, skimming) use to inject malicious code. Application-level API calls made via fetch() or XMLHttpRequest are outside CSD’s scope and are handled by other F5 XC security features (WAF, Bot Defense, API Protection).

See Phase 3 — Mitigate for a before/after proof demonstrating script blocking behavior.

How long do detections take to appear after running an attack?

Section titled “How long do detections take to appear after running an attack?”

Detection timing varies by endpoint:

EndpointTypical timingNotes
/detected_domainsMinutesPopulates first — this is the primary indicator that the CSD pipeline is processing
/scripts10–30 minutesUses a slower backend processing schedule
/formFields20–30 minutesML sensitivity classification (Sensitive vs Not Sensitive) requires additional processing

Detections persist across infrastructure teardown/rebuild when the same protected domain is re-registered on the same tenant. After a teardown and rebuild, query /detected_domains once — if the response contains items, prior detections are still available and no waiting is required.

See the Phase 2 — Detection Verification section for the recommended polling protocol.