imperva/cloud-waf Dashboards
The Account Overview dashboard provides comprehensive visibility into web application traffic patterns and security metrics through interactive monitoring visualizations. This dashboard enables tracking of request volumes, analysis of geographical access patterns, and monitoring of web application performance across the Imperva Cloud WAF environment.
The Search dashboard presents detailed event analysis and traffic investigation capabilities through multi-dimensional security visualizations. This dashboard enables investigation of security incidents, examination of client behavior patterns, and monitoring of event distributions across protected domains.
The WAF Overview dashboard provides comprehensive security threat monitoring through detailed attack detection visualizations. This dashboard enables tracking of various attack vectors, analysis of threat patterns, and assessment of security policy effectiveness across the web application infrastructure.
Account Overview
The Account Overview dashboard provides comprehensive visibility into web application traffic patterns and security metrics through interactive monitoring visualizations. This dashboard enables tracking of request volumes, analysis of geographical access patterns, and monitoring of web application performance across the Imperva Cloud WAF environment.
| Widget | Description | Type |
|---|---|---|
Count of all seen web applications and websites in the last 24
hours.
| Single Value | |
REQ_BAD_X: If a protocol or network error occurred
| Single Value | |
REQ_PASSED: If the request was routed to the site's web server
| Single Value | |
Table list of the top 5 countries by visit.
| Table | |
All incoming requests inclusive of both good and bad traffic.
| Single Value | |
Visually shows source traffic to onboarded web applications and
websites.
| World Map | |
Visually shows all traffic over the last 1 day in buckets of 15
minutes across all web applications and websites.
| Time Chart | |
REQ_BLOCKED_X: If the request was blocked
| Single Value | |
REQ_CHALLENGED_X: If a challenge was returned to the client
| Single Value | |
REQ_CACHED_X: If a response was returned from the data center's
cache
| Single Value | |
Basic information about web applications and websites onboarded in
the Imperva Cloud WAF Platform including Account and Site ID's
useful for API Calls. Note: This may not show all onboarded web
application if there has been no traffic to them in the last 24
hours.
| Table |
Search
The Search dashboard presents detailed event analysis and traffic investigation capabilities through multi-dimensional security visualizations. This dashboard enables investigation of security incidents, examination of client behavior patterns, and monitoring of event distributions across protected domains.
| Widget | Description | Type |
|---|---|---|
Top 3 locations when default.
| Table | |
Displays a list of events with source IP and domain data.
| Event List | |
Displays a pie chart of actions taken by source IP address.
| Pie Chart | |
Displays the number of non-security events by IP address and
domain.
| Single Value | |
Displays a list of security events by IP address and domain.
| Single Value | |
Events over time, filtered using parameter sourceIP and/or FQDN.
Default value is *.
| Time Chart | |
Displays a list of source IP addresses and domains used by vendor.
| Pie Chart |
WAF Overview
The WAF Overview dashboard provides comprehensive security threat monitoring through detailed attack detection visualizations. This dashboard enables tracking of various attack vectors, analysis of threat patterns, and assessment of security policy effectiveness across the web application infrastructure.
| Widget | Description | Type |
|---|---|---|
Displays a list of top attackers with associated location data.
| Single Value | |
Bots are identified according to Imperva's system of client
classification. All detected bad bots on any onboarded web
application are detected here.
| Single Value | |
Displays a list of events with source IP and domain data.
| Event List | |
Displays a list of security event traffic by location using
latitude and longitude.
| World Map | |
SQL injection is used to take advantage of non-validated input
vulnerabilities to pass SQL commands through a web application for
execution by a backend database
| Single Value | |
Displays a pie chart of actions taken by source IP address.
| Pie Chart | |
Distributed denial-of-service attack (DDoS attack) detected on
onboarded web application/s. Websites using Imperva DDoS
Protection are protected from any type of DDoS attack, including
both network (Layer 3 and 4) and application (Layer 7) attacks.
| Single Value | |
Displays a list of Imperva Advanced Bad Bot Protection instances
by vendor, domain, and country.
| Single Value | |
Backdoor Protect identifies backdoors not only by their HTTP
signatures but also by tracing back suspicious remote commands on
any onboarded web application.
| Single Value | |
Remote File Inclusion (RFI) is an attack that targets the web
servers that run websites and their applications. It represents an
attempt to manipulate an application into downloading or executing
a file from a remote location.
| Single Value | |
Any requests incoming that does not meet the API schema
specification defined in Imperva.
| Single Value | |
Any manually defined rule within Imperva used to implement
security, delivery, and access control.
| Single Value | |
Any Imperva defined WAF Policies.
| Single Value | |
Cross Site Scripting (XSS or CSS) is an attack that attempts to
run malicious code on your website visitor's browser.
| Single Value | |
Account Takeover (ATO) Protection detects and mitigates account
takeover attempts, protecting your web applications against
volumetric and low and slow ATO attacks.
| Single Value | |
Events over time, filtered using parameter sourceIP and/or FQDN.
Default value is *.
| Time Chart | |
An Illegal Resource Access attack attempts to access otherwise
private or restricted pages, or tries to view or execute system
files. This is commonly done using URL Fuzzing, Directory
Traversal or Command Injection techniques.
| Single Value |