View unanswered questions from your peers that need your expertise!
Use Case: Retrieve content from a 3rd party or location while masking the Origin. When a client accesses www.example. com ...
Hi Thomas, I was able to successfully deploy via the MXHA template in my AWS Lab. The first deployment initially failed due ...
Hi Thomas, I am attempting to deploy this in my AWS lab. In the meantime, I would suggest opening a ticket with Support. https://www.imperva.com/support/technical-support/ ...
Hello, We had configured the DML policy in the DAM and also we applied to the certain DBs, but the policy is not able to fetch ...
Hi all, Like to seek your kind advice. I have encountered the following error message in the agent's activity logs: Couldnt ...
Hello, We have an action set that sends events over syslog to Splunk from our MX's using CEF. I see new messages every day in ...
In my previous blog I looked at un-applied policies, disabled rules, and policies with no alerts. This blog will now look at ...
In this blog post, we'll explore the topic of un-applied policies, disabled rules, and policies with no alerts. We'll discuss ...
How to Create Efficient Signatures by Michael Gorelick Knowledge Engineer There are 3 types of signatures: Web, SQL, ...
#On-PremisesWAF(formerlySecuresphere)
Contact Us
JoinBenefitsLearn More
Terms of Use