Account Overview
WidgetDescriptionType
Sites Count of all seen web applications and websites in the last 24 hours.

Hide Query

Show Query

Single Value
Blocked Requests REQ_BAD_X: If a protocol or network error occurred

Hide Query

Show Query

Single Value
Allowed Requests REQ_PASSED: If the request was routed to the site's web server

Hide Query

Show Query

Single Value
Top 5 countries Table list of the top 5 countries by visit.

Hide Query

Show Query

Table
All Requests All incoming requests inclusive of both good and bad traffic.

Hide Query

Show Query

Single Value
Countries Accessing Web Application / Websites Visually shows source traffic to onboarded web applications and websites.

Hide Query

Show Query

World Map
All Traffic over time Visually shows all traffic over the last 1 day in buckets of 15 minutes across all web applications and wesites.

Hide Query

Show Query

Time Chart
Challenged Requests REQ_BLOCKED_X: If the request was blocked

Hide Query

Show Query

Single Value
Bad Requests REQ_CHALLENGED_X: If a challenge was returned to the client

Hide Query

Show Query

Single Value
Cached Requests REQ_CACHED_X: If a response was returned from the data center's cache

Hide Query

Show Query

Single Value
Web Application/s Basic information about web applications and websites onboarded in the Imperva Cloud WAF Platform including Account and Site ID's useful for API Calls. Note: This may not show all onboarded web application if there has been no traffic to them in the last 24 hours.

Hide Query

Show Query

Table
WAF Overview
WidgetDescriptionType
Top Attacker

Hide Query

Show Query

Single Value
Bot Access Control Bots are identified according to Imperva's system of client classification. All detected bad bots on any onboarded web application are detected here.

Hide Query

Show Query

Single Value
Events

Hide Query

Show Query

Event List
Traffic by Location

Hide Query

Show Query

World Map
SQL Injection SQL injection is used to take advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database

Hide Query

Show Query

Single Value
Actions taken

Hide Query

Show Query

Pie Chart
DDoS Distributed denial-of-service attack (DDoS attack) detected on onboarded web application/s. Websites using Imperva DDoS Protection are protected from any type of DDoS attack, including both network (Layer 3 and 4) and application (Layer 7) attacks.

Hide Query

Show Query

Single Value
Bad Bot (Advanced Bot Protection)

Hide Query

Show Query

Single Value
Backdoor Protect Backdoor Protect identifies backdoors not only by their HTTP signatures but also by tracing back suspicious remote commands on any onboarded web application.

Hide Query

Show Query

Single Value
Remote File Inclusion Remote File Inclusion (RFI) is an attack that targets the web servers that run websites and their applications. It represents an attempt to manipulate an application into downloading or executing a file from a remote location.

Hide Query

Show Query

Single Value
API Specification Violation Any requests incoming that does not meet the API schema specification defined in Imperva.

Hide Query

Show Query

Single Value
Manual Rule Any manually defined rule within Imperva used to implement security, delivery, and access control.

Hide Query

Show Query

Single Value
ACL Any Imperva defined WAF Policies.

Hide Query

Show Query

Single Value
Cross Site Scripting Cross Site Scripting (XSS or CSS) is an attack that attempts to run malicious code on your website visitor's browser.

Hide Query

Show Query

Single Value
Account Takeover Protection Account Takeover (ATO) Protection detects and mitigates account takeover attempts, protecting your web applications against volumetric and low and slow ATO attacks.

Hide Query

Show Query

Single Value
Events over time Events over time, filtered using parameter sourceIP and/or FQDN. Default value is *.

Hide Query

Show Query

Time Chart
Illegal Resource Access An Illegal Resource Access attack attempts to access otherwise private or restricted pages, or tries to view or execute system files. This is commonly done using URL Fuzzing, Directory Traversal or Command Injection techniques.

Hide Query

Show Query

Single Value