Successful Exploits
Successful Exploits Policy
Customizable filters that mark detected security threats by Akto's Runtime Threat Protection as successful exploits in the Threat Activity dashboard.
How to configure
Go to API Threat Detection → Threat Activity in the left sidebar. Click More Actions → Configure Successful Exploit.
Note: Policies must use category name SuccessfulExploit
Syntax Reference: For detailed syntax on how to define API selection filters, see API Selection Filters.

Example Successful Exploit Policy
Marks all threats as successful exploits when the URL contains test.

Last updated
Was this helpful?