imperva/cloud-waf Dashboards
Account Overview
Widget | Description | Type |
---|---|---|
Sites |
Count of all seen web applications and websites in the last 24
hours.
logscale
| Single Value |
Blocked Requests |
REQ_BAD_X: If a protocol or network error occurred
logscale
| Single Value |
Allowed Requests |
REQ_PASSED: If the request was routed to the site's web server
logscale
| Single Value |
Top 5 countries |
Table list of the top 5 countries by visit.
logscale
| Table |
All Requests |
All incoming requests inclusive of both good and bad traffic.
logscale
| Single Value |
Countries Accessing Web Application / Websites |
Visually shows source traffic to onboarded web applications and
websites.
logscale
| World Map |
All Traffic over time |
Visually shows all traffic over the last 1 day in buckets of 15
minutes across all web applications and wesites.
logscale
| Time Chart |
Challenged Requests |
REQ_BLOCKED_X: If the request was blocked
logscale
| Single Value |
Bad Requests |
REQ_CHALLENGED_X: If a challenge was returned to the client
logscale
| Single Value |
Cached Requests |
REQ_CACHED_X: If a response was returned from the data center's
cache
logscale
| Single Value |
Web Application/s |
Basic information about web applications and websites onboarded in
the Imperva Cloud WAF Platform including Account and Site ID's
useful for API Calls. Note: This may not show all onboarded web
application if there has been no traffic to them in the last 24
hours.
logscale
| Table |
Search
Widget | Description | Type |
---|---|---|
Top 3 Locations |
Top 3 locations when default.
logscale
| Table |
Events | logscale
| Event List |
Actions taken | logscale
| Pie Chart |
Non-Security Events | logscale
| Single Value |
Security Events | logscale
| Single Value |
Events over time |
Events over time, filtered using parameter sourceIP and/or FQDN.
Default value is *.
logscale
| Time Chart |
Client used |
Displays a list of source IP addresses and domains used by vendor.
logscale
| Pie Chart |
WAF Overview
Widget | Description | Type |
---|---|---|
Top Attacker | logscale
| Single Value |
Bot Access Control |
Bots are identified according to Imperva's system of client
classification. All detected bad bots on any onboarded web
application are detected here.
logscale
| Single Value |
Events | logscale
| Event List |
Traffic by Location | logscale
| World Map |
SQL Injection |
SQL injection is used to take advantage of non-validated input
vulnerabilities to pass SQL commands through a web application for
execution by a backend database
logscale
| Single Value |
Actions taken | logscale
| Pie Chart |
DDoS |
Distributed denial-of-service attack (DDoS attack) detected on
onboarded web application/s. Websites using Imperva DDoS
Protection are protected from any type of DDoS attack, including
both network (Layer 3 and 4) and application (Layer 7) attacks.
logscale
| Single Value |
Bad Bot (Advanced Bot Protection) | logscale
| Single Value |
Backdoor Protect |
Backdoor Protect identifies backdoors not only by their HTTP
signatures but also by tracing back suspicious remote commands on
any onboarded web application.
logscale
| Single Value |
Remote File Inclusion |
Remote File Inclusion (RFI) is an attack that targets the web
servers that run websites and their applications. It represents an
attempt to manipulate an application into downloading or executing
a file from a remote location.
logscale
| Single Value |
API Specification Violation |
Any requests incoming that does not meet the API schema
specification defined in Imperva.
logscale
| Single Value |
Manual Rule |
Any manually defined rule within Imperva used to implement
security, delivery, and access control.
logscale
| Single Value |
ACL |
Any Imperva defined WAF Policies.
logscale
| Single Value |
Cross Site Scripting |
Cross Site Scripting (XSS or CSS) is an attack that attempts to
run malicious code on your website visitor's browser.
logscale
| Single Value |
Account Takeover Protection |
Account Takeover (ATO) Protection detects and mitigates account
takeover attempts, protecting your web applications against
volumetric and low and slow ATO attacks.
logscale
| Single Value |
Events over time |
Events over time, filtered using parameter sourceIP and/or FQDN.
Default value is *.
logscale
| Time Chart |
Illegal Resource Access |
An Illegal Resource Access attack attempts to access otherwise
private or restricted pages, or tries to view or execute system
files. This is commonly done using URL Fuzzing, Directory
Traversal or Command Injection techniques.
logscale
| Single Value |