There are many different Cloud WAF Rules (sometimes referred to as InCap Rules), that you can use to help make your WAF add value to your business processes.
In this section, you will find content around Cloud WAF rules and a video that will go in depth around five Cloud WAF Rules you might of not known about. Use the Imperva rules proprietary scripting language to implement your own security, delivery, and access control rules on top of Imperva's existing security and application delivery logic.
FAQ's for Cloud WAF Rules|Q. Is there a way to setup shared Rules that can be enabled for multiple sites without having to create separate rules that do the same thing for multiple websites?|A. The framework has been created and available now to apply policy for SiteACL and whitelist to sub-account and sites. Incaprule is planned to added in this framework. As of now incaprules are not part of policy framework so these need to be manually copied or use API to copy them between sites.|Q. Which is processed first a blacklisted IP, or a rule that was created to block an IP? Is one method more efficient than another?|A. Incaprule are by default have alert, block or challenge actions. All rules are evaluated before action. Request matching no matching rules are allowed to origin.|Q. Is there a way to block SQL injection at Imperva for Java based application? |A. There are 1000s of SQLi default rules and if needed incaprule can be used to control specific use case. Please note the rule with regex can only be applied by support team.|Q. Can we pass the client_IP value in the header rewrite? |A. By default the client_ip is sent in XFF and incap_client_ip header to origin . A custom rule is not available yet. |Q. If we have configured cache on the WAF, deploying new rules are they applied immediately? Usually comments are configured on static pages, and hence we do add cache on static pages, adding rules, will it be applied immediately?(Limit number of comments)|A. Cache policies can detect possible dynamic content by learning or custom rules can help, but the incaprules are applied within few seconds across the CDN. Not sure what is the actual ask here 6. Is their a possibility to setup a rule to block udp flooding? WAF by default have DDOS protection and UDP flooding never reach origin as CWAF will pass only web traffic to origin. If the origin is non web application Infra and per IP DDOS solutions are also availableGetting Started: These are documents pulled by https://docs.imperva.com/ site to give you a more in-depth understanding on how to setup your Cloud WAF websites, rules, logs and more.
These are the top resources on the community that go more in-depth while you use Imperva Cloud WAF. If you are a developer, these blogs will help.
Hello Driss, Thank you for your post. The ABP managed conditions "Web Scraping Low/Medium/High Confidence" are based on behavioral models called ...
Hi, Let's say we have two people behind the same public IP address. Both users access the same application. The first user uses automation, which ...
Cloud Application Security Documentation
Cloud Application Security Release Notes
Imperva Status Page
Imperva Uservoice
Application Security overview
CWAF Intro Page and How To Guides
Imperva Customer Support Portal
Contact Us
JoinBenefitsLearn More
Terms of Use