AppTrana
Getting Started
Frequently Asked Questions
Product Details
API Scan Coverage for OWASP Top 10
Whitelist Vulnerabilities on the AppTrana WAAP
API Request to Purge CDN Data
Analysis page - Attack Trend Visualisation
Advanced Behavioral DDoS
BOT Protection
Asset Discovery
Restricted Admin User
Self Service Rules
Configuring Custom Error Page in AppTrana
Enabling SIEM Integration
API Discovery Feature
SwyftComply
Analysis page - Access Trend Visualization
Manage WAAP Email Alerts
Enable and Configure Single Sign-On
WAF Automated Bypass and Unbypass
False Positive Analysis Report on WAAP
Product User Guide
Indusface WAS
Getting Started
Product User Guide
Summary
Dashboard
Malware Monitoring[MM]
Application Audit[AA]
Vulnerability Assessment[VA]
Reports
Settings
Asset Monitoring
New Reporting Structure
Frequently Asked Questions
Feature Summary
AcuRisQ – Risk Management with Advanced Risk Scoring
WAS Consulting License
WAS Defacement Checks
SIEM Integration with Sumo Logic
Indusface WAS Scanned Vulnerabilities
Total Application Security
Onboarding Documents
Indusface Newsletter
Indusface Product Newsletter - October 2021
Indusface Product Newsletter- April 2021
Indusface Product Newsletter-January21
Indusface Product Newsletter - June 20
Indusface Product Newsletter - October 19
Indusface Product Newsletter - August 19
Product Newsletter of May 19
Product Newsletter of March 19
Product Newsletter of January 19
WAF Portal Revamp June 18
Product Newsletter of July 18
Product Newsletter of May 18
Product Newsletter of March 18
Product Newsletter of February 18
Product Newsletter of January 18
Indusface Product Newsletter - March 2022
Indusface Product Newsletter - February 2023
Indusface Product Newsletter- October 2022
Zero Day Vulnerability Reports
Vulnerabilities Detected in 2023
Vulnerability Report of May 23
Vulnerability Report of March 23
Vulnerability Report of August 23
Vulnerability Report of July 23
Vulnerability Report of April 23
Vulnerability Report of November 23
Vulnerability Report of June 23
Vulnerability Report of December 23
Vulnerability Report of February 23
Vulnerability Report of January 23
Vulnerability Report of September 23
Vulnerability Report of October 23
Vulnerabilities Detected in 2016
CRS vs. Zero Day Vulnerability - December 2016
CRS vs. Zero Day Vulnerability - November 2016
CRS vs. Zero Day Vulnerability - October 2016
CRS vs Zero Day Vulnerability - September 2016
CRS Vs Zero Day Vulnerabilities - August 2016
Vulnerabilities Detected in 2017
Vulnerability Report of April 17
Vulnerability report for Apr 3rd - Apr 9th 17
Vulnerability report for April 17th - Apr 23rd 17
Vulnerability report of April 10th - April 16th
Vulnerability Report of March 17
Vulnerability report for Mar 20th - Mar 26th
Vulnerability report for Mar 13th - Mar 19th
Vulnerability report for 27th Feb - 5th Mar
Vulnerability report for Mar 27th - Apr 2nd
Vulnerability report for Mar 6th - Mar 12th
Vulnerability Report of February 17
Vulnerability Report of January 17
Vulnerability Report of December 17
Vulnerability Report of November 17
Vulnerability Report of August 17
Vulnerability Report of September 17
Vulnerability Report of October 17
Vulnerability Report of July 17
Vulnerability Report of June 17
Vulnerability Report of May 17
Vulnerabilities Detected in 2018
Vulnerability Report of December 18
Vulnerability Report of November 18
Vulnerability Report of October 18
Vulnerability Report of September 18
Vulnerability Report of August 18
Vulnerability Report of July 18
Vulnerability Report of June 18
Vulnerability Reports of May 18
Vulnerability Report of April 18
Vulnerability Report of March 18
Vulnerability Report of February 18
Vulnerability Report of January 18
Vulnerabilities Detected in 2019
Vulnerability Report of December 19
Vulnerability Report of November 19
Vulnerability Report of October 19
Vulnerability Report of September 19
Vulnerability Report of August 19
Vulnerability Report of July 19
Vulnerability Report of June 19
Vulnerability Report of May 19
Vulnerability Report of April 19
Vulnerability Report of March 19
Vulnerability Report of February 19
Vulnerability Report of January 19
vulnerabilities Detected in 2020
Vulnerability Report of December 20
Vulnerability Report of November 20
Vulnerability Report of October 20
Vulnerability Report of Sep 20
Vulnerability Report of July 20
Vulnerability Report of June 20
Vulnerability Report of May 20
Vulnerability Report of April 20
Vulnerability Report of March 20
Vulnerability Report of February 20
Vulnerability Report of January 20
Vulnerabilities Detected in 2021
Vulnerability Report of November 21
Vulnerability Report of October 21
Vulnerability Report of September 21
Vulnerability Report of August 21
Vulnerability Report of July 21
Vulnerability Report of June 21
Vulnerability Report of May 21
Vulnerability Report of April 21
Vulnerability Report of March 21
Vulnerability Report of February 21
Vulnerability Report of January 21
Vulnerability Report of December 21
Vulnerabilities Detected in 2022
Vulnerability Report of January 22
Vulnerability Report of February 22
Vulnerability Report of March 22
Vulnerability Report of April 22
Vulnerability Report of May 22
Vulnerability Report of June 22
Vulnerability Report of July 22
Vulnerability Report of August 22
Vulnerability Report of September 22
Vulnerability Report of October 22
Vulnerability Report of November 22
Zero-Day Vulnerability Report - December 2022
Vulnerabilities Detected in 2024
Security Bulletin
Vulnerabilities 2024
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)
ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
CVE-2024-1071 – Critical Vulnerability in Ultimate Member WordPress Plugin
Oracle WebLogic Server Deserialization
ApacheStructs_VG
Apache Struts 2 Vulnerability CVE-2023-50164 Exposed
Unpacking the Zimbra Cross-Site Scripting Vulnerability(CVE-2023-37580)
Adobe ColdFusion Vulnerabilities Exploited in the Wild
Remote Unauthenticated API Access Vulnerabilities in Ivanti
Multiple Moveit Transfer Vulnerabilities
HTTP/2 Rapid Reset Attack Vulnerability
Apache log4j RCE vulnerability
Table of Contents
- How many Virtual Interfaces can be supported?
- What type Logs are supported ?
- Do you support SIEM integration?
- How to troubleshoot?
- Do you support connection pooling ?
- Do your solution work only for application on certain framework or OS?
- What type of performance optimisation do you provide?
- SSL Configuration
- Access Management
- All Categories
-
- TAS Logs & Reports
TAS Logs & Reports
Updated by Author
- How many Virtual Interfaces can be supported?
- What type Logs are supported ?
- Do you support SIEM integration?
- How to troubleshoot?
- Do you support connection pooling ?
- Do your solution work only for application on certain framework or OS?
- What type of performance optimisation do you provide?
- SSL Configuration
- Access Management
How many Virtual Interfaces can be supported?
Indusface On-premise solution can support any number of virtual hosts as per the requirement of solution. The sizing for the WAF instances should be done right based on the throughput requirement to ensure no performance degradation
What type Logs are supported ?
WAF generates all types of logs like audit logs, access logs, attack logs & system logs. These logs are periodically fetched by centralised portal which is used for analytics purpose. Access to these logs can be provided to customers.
Do you support SIEM integration?
Our logs are in standard log format which any SIEM can process. For SIEM integration, we ensure that the logs are placed in the local folder as per customer need from where can fetch the SIEM logs and process as per their need. API’s for SIEM integration is part of upcoming feature.
How to troubleshoot?
Trouble shooting will be carried out by Indusface Support team. Access to the WAF machine should be given to Indusface team. Team would carry out various diagnostic activities from the WAF machine like Ping, traceroute, telnet, wget, nslookup to identify the problem.
Do you support connection pooling ?
Yes we do support connection pooling by default. Keep alive value of the connection can be configured at each virtual host level. Please contact Indusface Support to change the keep alive value.
Do your solution work only for application on certain framework or OS?
No our solution is framework/OS agnostic and would support applications on any framework/OS
What type of performance optimisation do you provide?
Our performance optimisation settings can be done at virtual host level. Customer can reach out to support to do any of the following
- Enable Connection pooling for back-end requests
- Enable Caching
- Enable Compression
- Enable Keep alive settings
SSL Configuration
Do you protect against SSL attacks ?
Customers can choose to configure application to listen to only using Secured protocol. In which case any SSL/TLS based attack can be avoided. Configuration can be done at virtual host level.
What Cipher Suites are used ?
Cipher suites are configured based on application need. While on-boarding a site, our team checks the configuration and make necessary changes to ensure required Ciphers are available in WAF.
Do you alert customers in case of Certificate expiry?
Certificate expiry date for each application is shown in the portal and customer is notified 15 days before expiry through email
Access Management
Do you support 2FA ?
Yes we do support 2FA. We use Google Authenticator as the second factor for authentication. Currently we have implemented it for Admin access for internal user and will be soon enabled for all customers.
Do you support Single – Sign on?
LDAP Server & Radius Server Authentication is in beta phase and is being tested out currently. This would be made available soon for all customers.