Synthetic Monitor TLS Report
On This Page:
Objective
This guide provides instructions on how to review the TLS Report
that is generated for HTTP(s) Synthetic Monitors
. Endpoints with TLS enabled will automatically generate a TLS score along with a full report to help you quantify its current state of security.
Using the instructions provided in this document, you can navigate to and view the TLS report for a given HTTP(s) Synthetic Monitor
.
Prerequisites
- A previously configured
HTTP(s) Synthetic Monitor
with TLS enabled on the monitored endpoint.
Note: If you do not have a monitor setup, see the how-to for Advanced HTTP(s) Synthetic Monitor.
Configuration
View the TLS report of a monitor
Step 1: Navigate to the monitor.
-
Log into the F5® Distributed Cloud Console.
-
Navigate to the either the
Observability
workspace tile or menu.
Note: The homepage is role based, and your homepage may look different due to your role customization. Select
All Services
drop-down menu to discover all options.
![Figure: Observability Tile obs tile](/docs/static/7be0028d1a714a25607246892c3dd909/97dd6/obs-tile.png)
![Figure: Observability Menu obs service list](/docs/static/cdbb37a0b9024d972a6e769efcb7cb54/96258/obs-service-list.png)
-
Select
Synthetic Monitors
>HTTP Monitors
. -
Select the
All Monitors
tab to view your monitor inventory. -
Click on the name of the monitor you would like to review the
TLS Report
for.
![Figure: HTTP Monitor Menu dash menu](/docs/static/1caa017bf998dbf73e47f407a5994e6c/99e71/dash-menu.png)
Step 2: View the TLS Summary
- Within the
Global Summary
tile, you will notice aTLS Score
to give you an overall idea of how the monitored endpoint is doing.
![Figure: TLS Score tls score](/docs/static/74a25f07db725d681c8e1bba7ac0d87e/b1a8d/tls-score.png)
Step 3: View the TLS Report
-
Within the
TLS Summary
you can open the full report in a PDF or copy it to clipboard to stick in an email or chat with your team. -
Click on
Open as PDF
to view the full report.
![Figure: Open PDF open pdf](/docs/static/bfd66384617c5c6bdf9ad84a220149ef/3c7ba/open-pdf.png)
- Look through the report to discover configuration, vulnerabilities, and more. The example below is only a small example of what is provided.
![Figure: Report vulnerabilities](/docs/static/42d6e2d5a9feb62eddba57df54a1f40f/7c2fb/vulnerabilities.png)