AppTrana
Getting Started
Frequently Asked Questions
Product Details
API Scan Coverage for OWASP Top 10
Whitelist Vulnerabilities on the AppTrana WAAP
API Request to Purge CDN Data
Analysis page - Attack Trend Visualisation
Advanced Behavioral DDoS
BOT Protection
Asset Discovery
Restricted Admin User
Self Service Rules
Configuring Custom Error Page in AppTrana
Enabling SIEM Integration
API Discovery Feature
SwyftComply
Analysis page - Access Trend Visualization
Manage WAAP Email Alerts
Enable and Configure Single Sign-On
WAF Automated Bypass and Unbypass
False Positive Analysis Report on WAAP
Product User Guide
Indusface WAS
Getting Started
Product User Guide
Summary
Dashboard
Malware Monitoring[MM]
Application Audit[AA]
Vulnerability Assessment[VA]
Reports
Settings
Asset Monitoring
New Reporting Structure
Frequently Asked Questions
Feature Summary
AcuRisQ – Risk Management with Advanced Risk Scoring
WAS Consulting License
WAS Defacement Checks
SIEM Integration with Sumo Logic
Indusface WAS Scanned Vulnerabilities
Total Application Security
Onboarding Documents
Indusface Newsletter
Indusface Product Newsletter - October 2021
Indusface Product Newsletter- April 2021
Indusface Product Newsletter-January21
Indusface Product Newsletter - June 20
Indusface Product Newsletter - October 19
Indusface Product Newsletter - August 19
Product Newsletter of May 19
Product Newsletter of March 19
Product Newsletter of January 19
WAF Portal Revamp June 18
Product Newsletter of July 18
Product Newsletter of May 18
Product Newsletter of March 18
Product Newsletter of February 18
Product Newsletter of January 18
Indusface Product Newsletter - March 2022
Indusface Product Newsletter - February 2023
Indusface Product Newsletter- October 2022
Zero Day Vulnerability Reports
Vulnerabilities Detected in 2023
Vulnerability Report of May 23
Vulnerability Report of March 23
Vulnerability Report of August 23
Vulnerability Report of July 23
Vulnerability Report of April 23
Vulnerability Report of November 23
Vulnerability Report of June 23
Vulnerability Report of December 23
Vulnerability Report of February 23
Vulnerability Report of January 23
Vulnerability Report of September 23
Vulnerability Report of October 23
Vulnerabilities Detected in 2016
CRS vs. Zero Day Vulnerability - December 2016
CRS vs. Zero Day Vulnerability - November 2016
CRS vs. Zero Day Vulnerability - October 2016
CRS vs Zero Day Vulnerability - September 2016
CRS Vs Zero Day Vulnerabilities - August 2016
Vulnerabilities Detected in 2017
Vulnerability Report of April 17
Vulnerability report for Apr 3rd - Apr 9th 17
Vulnerability report for April 17th - Apr 23rd 17
Vulnerability report of April 10th - April 16th
Vulnerability Report of March 17
Vulnerability report for Mar 20th - Mar 26th
Vulnerability report for Mar 13th - Mar 19th
Vulnerability report for 27th Feb - 5th Mar
Vulnerability report for Mar 27th - Apr 2nd
Vulnerability report for Mar 6th - Mar 12th
Vulnerability Report of February 17
Vulnerability Report of January 17
Vulnerability Report of December 17
Vulnerability Report of November 17
Vulnerability Report of August 17
Vulnerability Report of September 17
Vulnerability Report of October 17
Vulnerability Report of July 17
Vulnerability Report of June 17
Vulnerability Report of May 17
Vulnerabilities Detected in 2018
Vulnerability Report of December 18
Vulnerability Report of November 18
Vulnerability Report of October 18
Vulnerability Report of September 18
Vulnerability Report of August 18
Vulnerability Report of July 18
Vulnerability Report of June 18
Vulnerability Reports of May 18
Vulnerability Report of April 18
Vulnerability Report of March 18
Vulnerability Report of February 18
Vulnerability Report of January 18
Vulnerabilities Detected in 2019
Vulnerability Report of December 19
Vulnerability Report of November 19
Vulnerability Report of October 19
Vulnerability Report of September 19
Vulnerability Report of August 19
Vulnerability Report of July 19
Vulnerability Report of June 19
Vulnerability Report of May 19
Vulnerability Report of April 19
Vulnerability Report of March 19
Vulnerability Report of February 19
Vulnerability Report of January 19
vulnerabilities Detected in 2020
Vulnerability Report of December 20
Vulnerability Report of November 20
Vulnerability Report of October 20
Vulnerability Report of Sep 20
Vulnerability Report of July 20
Vulnerability Report of June 20
Vulnerability Report of May 20
Vulnerability Report of April 20
Vulnerability Report of March 20
Vulnerability Report of February 20
Vulnerability Report of January 20
Vulnerabilities Detected in 2021
Vulnerability Report of November 21
Vulnerability Report of October 21
Vulnerability Report of September 21
Vulnerability Report of August 21
Vulnerability Report of July 21
Vulnerability Report of June 21
Vulnerability Report of May 21
Vulnerability Report of April 21
Vulnerability Report of March 21
Vulnerability Report of February 21
Vulnerability Report of January 21
Vulnerability Report of December 21
Vulnerabilities Detected in 2022
Vulnerability Report of January 22
Vulnerability Report of February 22
Vulnerability Report of March 22
Vulnerability Report of April 22
Vulnerability Report of May 22
Vulnerability Report of June 22
Vulnerability Report of July 22
Vulnerability Report of August 22
Vulnerability Report of September 22
Vulnerability Report of October 22
Vulnerability Report of November 22
Zero-Day Vulnerability Report - December 2022
Vulnerabilities Detected in 2024
Security Bulletin
Vulnerabilities 2024
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)
ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
CVE-2024-1071 – Critical Vulnerability in Ultimate Member WordPress Plugin
Oracle WebLogic Server Deserialization
ApacheStructs_VG
Apache Struts 2 Vulnerability CVE-2023-50164 Exposed
Unpacking the Zimbra Cross-Site Scripting Vulnerability(CVE-2023-37580)
Adobe ColdFusion Vulnerabilities Exploited in the Wild
Remote Unauthenticated API Access Vulnerabilities in Ivanti
Multiple Moveit Transfer Vulnerabilities
HTTP/2 Rapid Reset Attack Vulnerability
Apache log4j RCE vulnerability
- All Categories
- Total Application Security
- Onboarding Documents
- Bring Your Own Licence
- How to Setup Total Application Security For BYOL
- Access Total Application Security – BYOL
Access Total Application Security – BYOL
Updated by Author
EC2 Instance Installation Steps - BYOL
- Login to your AWS account if you are an existing user, otherwise Sign In to the Console.Type in Indusface in search bar and click Total Application Security: Scan, Pen-Testing, Managed WAF & DDoS displayed options.
[OR]
Click here to access Total Application Security on AWS Marketplace after login. Subscription page appears.
To estimate your costs, click Region Option drop-down and click a specific region. Similarly, click Fulfilment drop-down, click to select a specific option and Estimated Infrastructure Cost is displayed.
As per the Estimated Cost, a table shows current software and infrastructure pricing for services hosted in the selected region.
Go through What is the correct instance type for my website? link in Additional Resources option to determine the right instance for your website.
- Click Continue to Subscribe button to continue. Configuration page appears.
Indusface Terms and Conditions details is displayed, click Show Details in Action column.
- Click Continue to Configuration button. Configure page appears.
- Click Fulfilment Option drop-down and click a specific fulfilment. In the similar way, click and choose Software Version and Region options from the respective drop-downs.
Pricing Information displays the software pricing and infrastructure pricing for the selected region.
- Click Continue to Launch button. Launch page appears.
- Review your configuration details like Fulfilment Option, Software Version etc.
- Click Usage Instructions to view usage details.
The usage instructions of the selected software version is displayed in a pop-up.
- Click Choose Action drop-down and click Launch from Website option.
- Click EC2 Instance Type drop-down and click a specific instance. Selected Instance details are displayed on the side.
- Click Select a VPC drop-down in VPC Settings option and click to select a specific VPC.
To create a new VPC, click Create VPC in EC2 link below the drop-down.
- Click Select a subnet drop-down in Subnet Settings option and click a specific subnet.
To create a new subnet, click Create a subnet in EC2 link below the drop-down.
- Click Select a Security Group drop-down and click a specific option.
To create new security group, click Create New Based On Seller Settings button.
- Click Select a key pair drop-down in Key Pair Settings option, click a specific key pair.
To create a new key pair, click Create a key pair in EC2 option.
- Click Launch button to launch the instance.
Congratulations message is displayed with a successful launch.
- Click View Launch Configuration Details link to display configuration details.
Software Installation Details pop-up appears.
- Click EC2 Console link to view the created instance in the console. Instances page appears.
- Click Launch Time sort option to view most recently launched instances.
- Click to select the instance, click Name column, enter a name and then click the tick symbol.
Make a note of launched Instance ID as it is required for completing Apptrana registration.
- Click NETWORK & SECURITY in the left navigation plane, click Elastic IPs to create one static IP for your instance. Elastic IP page appears.
- Click Allocate New Address tab. Allocate New Address window appears.
By default, Amazon pool option is selected, click Owned by me button if you have own IP address associated in aws.
- Click Allocate button. Success message is displayed.
New address request succeeded message is displayed.
- Click Elastic IP address to display the details. Elastic IP page appears.
The created IP address is displayed with details like Elastic IP, Application ID etc.
- Click Actions drop-down, click Associate address option to link your IP to the created elastic IP. Associate address page appears.
- Click to select the Instance or Network Interface in Resource Type option to which you want to associate your Elastic IP address.
- Click Instance drop-down, click to select your instance and Private IP is pre-populated by default.Usually Re-association option is suggested to avoid. In case chosen IP address is wrong, the existing machine is affected.
- Click Associate button. Success message is displayed.
Associate address request succeeded message is displayed.
- Click Close button. Elastic IP page appears.
- Click Instances option in the left navigation plane, click to select a specific instance. Instance details like Public IP Address is displayed.Click here to configure TAS on the AMI Instance.