imperva/cloud-waf Dashboards
Account Overview
Widget | Description | Type |
---|---|---|
Count of all seen web applications and websites in the last 24
hours.
logscale
| Single Value | |
REQ_BAD_X: If a protocol or network error occurred
logscale
| Single Value | |
REQ_PASSED: If the request was routed to the site's web server
logscale
| Single Value | |
Table list of the top 5 countries by visit.
logscale
| Table | |
All incoming requests inclusive of both good and bad traffic.
logscale
| Single Value | |
Visually shows source traffic to onboarded web applications and
websites.
logscale
| World Map | |
Visually shows all traffic over the last 1 day in buckets of 15
minutes across all web applications and wesites.
logscale
| Time Chart | |
REQ_BLOCKED_X: If the request was blocked
logscale
| Single Value | |
REQ_CHALLENGED_X: If a challenge was returned to the client
logscale
| Single Value | |
REQ_CACHED_X: If a response was returned from the data center's
cache
logscale
| Single Value | |
Basic information about web applications and websites onboarded in
the Imperva Cloud WAF Platform including Account and Site ID's
useful for API Calls. Note: This may not show all onboarded web
application if there has been no traffic to them in the last 24
hours.
logscale
| Table |
Search
Widget | Description | Type |
---|---|---|
Top 3 locations when default.
logscale
| Table | |
Displays a list of events with source IP and domain data.
logscale
| Event List | |
Displays a pie chart of actions taken by source IP address.
logscale
| Pie Chart | |
Displays the number of non-security events by IP address and
domain.
logscale
| Single Value | |
Displays a list of security events by IP address and domain.
logscale
| Single Value | |
Events over time, filtered using parameter sourceIP and/or FQDN.
Default value is *.
logscale
| Time Chart | |
Displays a list of source IP addresses and domains used by vendor.
logscale
| Pie Chart |
WAF Overview
Widget | Description | Type |
---|---|---|
Displays a list of top attackers with associated location data.
logscale
| Single Value | |
Bots are identified according to Imperva's system of client
classification. All detected bad bots on any onboarded web
application are detected here.
logscale
| Single Value | |
Displays a list of events with source IP and domain data.
logscale
| Event List | |
Displays a list of security event traffic by location using
latitude and longitude.
logscale
| World Map | |
SQL injection is used to take advantage of non-validated input
vulnerabilities to pass SQL commands through a web application for
execution by a backend database
logscale
| Single Value | |
Displays a pie chart of actions taken by source IP address.
logscale
| Pie Chart | |
Distributed denial-of-service attack (DDoS attack) detected on
onboarded web application/s. Websites using Imperva DDoS
Protection are protected from any type of DDoS attack, including
both network (Layer 3 and 4) and application (Layer 7) attacks.
logscale
| Single Value | |
Displays a list of Imperva Advanced Bad Bot Protection instances
by vendor, domain, and country.
logscale
| Single Value | |
Backdoor Protect identifies backdoors not only by their HTTP
signatures but also by tracing back suspicious remote commands on
any onboarded web application.
logscale
| Single Value | |
Remote File Inclusion (RFI) is an attack that targets the web
servers that run websites and their applications. It represents an
attempt to manipulate an application into downloading or executing
a file from a remote location.
logscale
| Single Value | |
Any requests incoming that does not meet the API schema
specification defined in Imperva.
logscale
| Single Value | |
Any manually defined rule within Imperva used to implement
security, delivery, and access control.
logscale
| Single Value | |
Any Imperva defined WAF Policies.
logscale
| Single Value | |
Cross Site Scripting (XSS or CSS) is an attack that attempts to
run malicious code on your website visitor's browser.
logscale
| Single Value | |
Account Takeover (ATO) Protection detects and mitigates account
takeover attempts, protecting your web applications against
volumetric and low and slow ATO attacks.
logscale
| Single Value | |
Events over time, filtered using parameter sourceIP and/or FQDN.
Default value is *.
logscale
| Time Chart | |
An Illegal Resource Access attack attempts to access otherwise
private or restricted pages, or tries to view or execute system
files. This is commonly done using URL Fuzzing, Directory
Traversal or Command Injection techniques.
logscale
| Single Value |