Attack events 
Note
The Attacks events view is for hosted customers.
If you are an on-premises customer, visit Attacks.
Attack events are any actions that unauthorized individuals or groups take to damage, disrupt, or gain illegal access to an application's systems, data, or functionality. Examples of attack events include:
SQL injection: An attacker inserts malicious code into your application's database queries to steal data or take control of your systems.
Cross-site scripting (XSS): An attacker injects malicious scripts into your application to steal user data or redirect them to malicious websites.
API attacks: An attacker exploits vulnerabilities in your APIs to gain unauthorized access to data or functionality.
Event data retention
Contrast keeps attack event data for up to a year. You can also:
A webhook receives data in a POST request only when a specified event occurs. When the webhook sees the event, it collects the data and sends it to the specified URL.
Integrate ADR with Security Information and Event Management (SIEM) tools
Exclusion of PROBED event data
You can choose to stop saving data for attack events with a PROBED result. You might want to do this to improve performance in the Contrast web interface.
To stop saving PROBED event data, contact Customer Support .
Tasks
In Contrast you can: