Home

Latest Discussions

  • Hello @Scott Morgan Please find below output of the command you asked to run:- ​ Br// Ashutosh ------------------------------ Ashutosh Chaurasia Senior Security Engineer Melbourne VIC ------------------------------

  • Hi Ken, I chatted with some of our customer success team and they suggested the following: If the customer uploads the GTI to FTP then we can produce an automated health report. Otherwise they use the system monitoring tools. You can find these here: ...

  • Hi Ken, Thanks for the update! That would make sense since only a single followed action can be defined, it's common to create a custom followed action that includes both sending the result to a SIEM as well as a long/short IP block. I'm glad you were ...

  • Manual mitigation for CVE-2022-31659 and CVE-2022-31656 Jack Pincombe Information Security Analyst The high profile vulnerability assigned ' CVE-2022-31659 VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability. ...

  • Hi, While I'm not sure on the errors with the SDK, I use a simpler approach and has worked really well for all of the integrations I have developed. Please see a few links below. I use the generic ss.makeCall() function when including the following library ...

  • Hi Riccardo, I checked in with support and, unfortunately, there are a lot of variables and possible causes here. Please open support ticket and provide as much detail as possible. Many thanks, Sarah ------------------------------ Sarah Lamont ...

  • Hi Emma, My understanding is that this relates to DAM. This looks like a dashboard on the MX under Audit > db audit data. Let us know if you find it there! :-) ------------------------------ Sarah Lamont Digital Community Manager -------------- ...

  • Use Case: Enrich headers with Geolocation data. Rule Filter : Leave this blank Rule Action : Rewrite Request Header Header Name: X-Loc Note: You can enter your own name for the header. X-Loc is an example. This will be the name of the custom ...

  • Hey Steve, Thanks for posting. I checked in with our team and this was their response... The WAF will detect suspicious activity over http/https (80/443) There are many cases where the attacker/user can send FTP(20/21) over HTTP, in that case, the ...

Community Blogs

Can you help? Here are unanswered questions:

  • Hi all, I am new to Imperva's Cloud WAF and am curious if anyone has experience with integrating Imperva Cloud WAF (Incapsula) with Rapid 7's Insight IDR and SIEM. Mainly, I'd like to see the event logs get pushed to Insight IDR if possible. What have ...

Please log in to community to view our video content

Leaderboard