For more information on Downdetector, see: Downdetector. Users can also specify the details of the SSL certificate. Users can also create FQDN names for application servers. Tip: Users normally enable either transformation or blocking, but not both. Users might want to view a list of the attacks on an application and gain insights into the type and severity of attacks, actions taken by the ADC instance, resources requested, and the source of the attacks. Users can select the time duration in bot insight page to view the events history. See the StyleBook section below in this guide for details. Running the Citrix ADC VPX load balancing solution on ARM imposes the following limitations: The Azure architecture does not accommodate support for the following Citrix ADC features: L2 Mode (bridging). While users can always view the time of attack in an hourly report as seen in the image above, now they can view the attack time range for aggregated reports even for daily or weekly reports. This ensures that browsers do not interpret unsafe html tags, such as