View unanswered questions from your peers that need your expertise!
Use Case: Retrieve content from a 3rd party or location while masking the Origin. When a client accesses www.example. com ...
Hi, First it was reported phishing in what aspect? Referrers from your domain or email addresses from your domain There ...
Hi Seugyeon, While these columns cannot be added to the alert view, we can get this data from a custom report. Access Main ...
Hello. If you run monitor > alerts > save as alert csv, I can see the fields as below. Alert No. Num. of Events Alert Description ...
Getting Agent monitoring error on Oracle DB. Kindly assist how to resolve the same. #DatabaseActivityMonitoring ------------------------------ ...
You can add those fields by customizing the syslog output. What you are looking for is the placeholders to add the needed values. ...
.
Hi Community, Are you subscribed to our release notes? Click here and click on "Subscribe to Updates" to receive the updates ...
How to Create Efficient Signatures by Michael Gorelick Knowledge Engineer There are 3 types of signatures: Web, SQL, ...
Hi Community, I wanted to provide a quick snapshot of Imperva's security landscape. This is a great way for your to visualise ...
How to integrate Data Risk Analytics (DRA) with Data Security Fabric (DSF) Data is a core element for every business. ...
#On-PremisesWAF(formerlySecuresphere)
Contact Us
JoinBenefitsLearn More
Terms of Use