/

Cloud Configuration

Configure Monitor protections, response actions, logging, and advanced settings from the ByteHide Cloud Dashboard. Changes sync to your application in real-time without redeployment.


Overview

Cloud configuration is the recommended way to manage Monitor. Instead of editing JSON files or writing code, you define protection rules, response actions, and operational settings from the web dashboard. Every change propagates instantly to all running instances of your application.

Configuration Priority

Cloud configuration takes the highest priority. Any configuration applied through the dashboard will override both the protections defined in monitor.config.json and those written directly in code.


Workflow Rules

The Workflow tab is where you define how Monitor responds to each type of threat. Rules follow an IF/THEN pattern: if a specific threat type is detected, then execute one or more actions.

ByteHide Monitor workflow rules showing IF/THEN configuration for Command Injection and SQL Injection with Log, Block, Block session, and Block IP actionsClick to expand

Creating a Rule

  1. Go to the Workflow tab in your Monitor project
  2. Click + Add Rule
  3. Select the protection type (SQL Injection, XSS, Command Injection, etc.)
  4. Check the actions to execute when this threat is detected:
    • Log incident: Record the incident with full forensic context
    • Block: Block the specific request or operation
    • Block session: Invalidate the attacker's entire session
    • Block IP: Block all traffic from the source IP address

Notifications

Each rule can also trigger notifications:

  • Slack: Connect your Slack workspace to receive real-time alerts when incidents match the rule
  • Webhook: Send incident data to any HTTP endpoint (SIEM, PagerDuty, custom systems)

Exporting Configuration

Click Export config to download your current workflow rules as a JSON file. This is useful for:

  • Version-controlling your configuration alongside your application code
  • Copying rules between projects
  • Using as a base for JSON Configuration in offline environments

Advanced Settings

Click Advanced Config in the Workflow tab to open the advanced configuration panel. These settings control Monitor's operational behavior.

ByteHide Monitor advanced configuration panel with logging levels, anomaly detection, rate limiting, and debug mode settingsClick to expand

Logging

SettingOptionsDescription
LoggingOn/OffEnable or disable Monitor logging
Minimum LevelDebug, Info, Warning, Error, CriticalControls which events are recorded. Use Info for production, Debug for troubleshooting
Console OutputOn/OffWrite log events to standard output
Debug LoggingOn/OffVerbose diagnostic output. Not recommended for production
Local LoggingOn/OffWrite events to a local log file on disk
ByteHide LogsOn/OffSend events to ByteHide Logs for centralized, immutable logging. Recommended

Anomaly Detection

Toggle to enable or disable Anomaly Detection. When enabled, Monitor automatically learns your application's normal behavior and flags deviations: authentication anomalies, abnormal request rates, unexpected payload structures, and suspicious session activity. Enabled by default.

Rate Limit

Toggle to enable request rate limiting. When enabled, Monitor limits the number of requests processed within a configurable time window, providing protection against brute force and denial of service attempts.

Debug Mode

Enables verbose debugging output and additional diagnostic information. Marked as "Not in production" in the dashboard for a reason: it generates significant overhead and should only be used during development or active troubleshooting.

Throw On Failure

When enabled, Monitor will throw exceptions if it encounters internal errors instead of silently logging them. Useful during development to catch configuration issues early.


Project Settings

The Settings tab contains project-level configuration.

ByteHide Monitor project settings showing project token, session duration configuration, and token reset optionsClick to expand

Project Token

Your project token (bh_...) authenticates your application with the ByteHide platform. Copy it into your environment variables or configuration file.

Bash
# Set as environment variable
export BYTEHIDE_TOKEN="bh_your_token_here"

See Create a Monitor Project for details on token management.

Session Duration

Configure how long a session remains active before expiring. Default is 60 seconds of inactivity. Sessions group related requests and incidents from the same device, making it easier to trace attack patterns.

Reset Token

Generates a new project token and invalidates the previous one. Use this if your token has been compromised or leaked. After resetting, update the token in all deployed applications.

Removes the Monitor integration from this project. This is a destructive action that cannot be undone.


How Configuration Syncs

  1. You make changes in the Cloud Dashboard (workflow rules, advanced settings, firewall rules)
  2. Monitor agents running in your applications periodically sync with the ByteHide API
  3. Updated configuration is applied immediately, without restarting the application
  4. If the application cannot reach the API (offline, network issues), it continues operating with the last known configuration

This means your security team can update response policies, add firewall rules, or adjust logging levels across every running instance of your application without involving the development team or redeploying.


Configuration Priority

Monitor supports three configuration methods. When multiple are present, they are applied in this priority order:

PriorityMethodWhen to Use
1 (highest)Cloud DashboardProduction. Real-time updates, team collaboration, no code changes
2JSON File (monitor.config.json)Offline environments, air-gapped deployments, version-controlled config
3 (lowest)Code (Configuration API)Custom actions, programmatic logic, development-time defaults

You can combine methods. For example, use the Configuration API to register custom action handlers in code, and use the Cloud Dashboard to assign those handlers to specific protection modules and define escalation rules.


Next Steps

JSON Configuration

Local configuration files for offline environments

Configuration API

Code-based configuration for custom actions and programmatic control

Workflow Rules

Detailed guide on creating and managing workflow rules

Cloud Panel Overview

Full tour of the Monitor dashboard

Previous
CI/CD