Monitor exposed credentials events
The Activity log in Security Events shows entries for requests with exposed credentials identified by rules with the Log action.
Check for exposed credentials events in the Security Events dashboard (Security > Events tab), filtering by a specific Rule ID. For more information on filtering security events, refer to Adjusting displayed data.
Exposed credentials events are only logged after you activate the Exposed Credentials Check Managed Ruleset or create a custom rule checking for exposed credentials.
The log entries will not contain the values of the exposed credentials (username, email, or password). However, if matched payload logging is enabled, the log entries will contain the values of the fields in the rule expression that triggered the rule. These values might be the values of credential fields, depending on your rule configuration.