Account Overview
WidgetDescriptionType
Sites Count of all seen web applications and websites in the last 24 hours.

Show Query

Single Value
Blocked Requests REQ_BAD_X: If a protocol or network error occurred

Show Query

Single Value
Allowed Requests REQ_PASSED: If the request was routed to the site's web server

Show Query

Single Value
Top 5 countries Table list of the top 5 countries by visit.

Show Query

Table
All Requests All incoming requests inclusive of both good and bad traffic.

Show Query

Single Value
Countries Accessing Web Application / Websites Visually shows source traffic to onboarded web applications and websites.

Show Query

World Map
All Traffic over time Visually shows all traffic over the last 1 day in buckets of 15 minutes across all web applications and websites.

Show Query

Time Chart
Challenged Requests REQ_BLOCKED_X: If the request was blocked

Show Query

Single Value
Bad Requests REQ_CHALLENGED_X: If a challenge was returned to the client

Show Query

Single Value
Cached Requests REQ_CACHED_X: If a response was returned from the data center's cache

Show Query

Single Value
Web Application/s Basic information about web applications and websites onboarded in the Imperva Cloud WAF Platform including Account and Site ID's useful for API Calls. Note: This may not show all onboarded web application if there has been no traffic to them in the last 24 hours.

Show Query

Table
WAF Overview
WidgetDescriptionType
Top Attacker Displays a list of top attackers with associated location data.

Show Query

Single Value
Bot Access Control Bots are identified according to Imperva's system of client classification. All detected bad bots on any onboarded web application are detected here.

Show Query

Single Value
Events Displays a list of events with source IP and domain data.

Show Query

Event List
Traffic by Location Displays a list of security event traffic by location using latitude and longitude.

Show Query

World Map
SQL Injection SQL injection is used to take advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database

Show Query

Single Value
Actions taken Displays a pie chart of actions taken by source IP address.

Show Query

Pie Chart
DDoS Distributed denial-of-service attack (DDoS attack) detected on onboarded web application/s. Websites using Imperva DDoS Protection are protected from any type of DDoS attack, including both network (Layer 3 and 4) and application (Layer 7) attacks.

Show Query

Single Value
Bad Bot (Advanced Bot Protection) Displays a list of Imperva Advanced Bad Bot Protection instances by vendor, domain, and country.

Show Query

Single Value
Backdoor Protect Backdoor Protect identifies backdoors not only by their HTTP signatures but also by tracing back suspicious remote commands on any onboarded web application.

Show Query

Single Value
Remote File Inclusion Remote File Inclusion (RFI) is an attack that targets the web servers that run websites and their applications. It represents an attempt to manipulate an application into downloading or executing a file from a remote location.

Show Query

Single Value
API Specification Violation Any requests incoming that does not meet the API schema specification defined in Imperva.

Show Query

Single Value
Manual Rule Any manually defined rule within Imperva used to implement security, delivery, and access control.

Show Query

Single Value
ACL Any Imperva defined WAF Policies.

Show Query

Single Value
Cross Site Scripting Cross Site Scripting (XSS or CSS) is an attack that attempts to run malicious code on your website visitor's browser.

Show Query

Single Value
Account Takeover Protection Account Takeover (ATO) Protection detects and mitigates account takeover attempts, protecting your web applications against volumetric and low and slow ATO attacks.

Show Query

Single Value
Events over time Events over time, filtered using parameter sourceIP and/or FQDN. Default value is *.

Show Query

Time Chart
Illegal Resource Access An Illegal Resource Access attack attempts to access otherwise private or restricted pages, or tries to view or execute system files. This is commonly done using URL Fuzzing, Directory Traversal or Command Injection techniques.

Show Query

Single Value