- All Categories
- AppTrana Product Details
AppTrana
Getting Started
Frequently Asked Questions
Product Details
API Scan Coverage for OWASP Top 10
Whitelist Vulnerabilities on the AppTrana WAAP
API Request to Purge CDN Data
Analysis page - Attack Trend Visualisation
Advanced Behavioral DDoS
BOT Protection
Asset Discovery
Customize Application Behavior with Bot Score
Restricted Admin User
Self Service Rules
Configuring Custom Error Page in AppTrana
Enabling SIEM Integration
API Discovery Feature
SwyftComply
Analysis page - Access Trend Visualization
Manage WAAP Email Alerts
Enable and Configure Single Sign-On
WAF Automated Bypass and Unbypass
False Positive Analysis Report on WAAP
Product User Guide
Indusface WAS
Getting Started
Product User Guide
Summary
Dashboard
Malware Monitoring[MM]
Application Audit[AA]
Vulnerability Assessment[VA]
Reports
Settings
Asset Monitoring
New Reporting Structure
Frequently Asked Questions
Feature Summary
AcuRisQ – Risk Management with Advanced Risk Scoring
WAS Consulting License
API Key Based - Scan Log Export
WAS Defacement Checks
SIEM Integration with Sumo Logic
Indusface WAS Scanned Vulnerabilities
Total Application Security
Onboarding Documents
Indusface Newsletter
Indusface Product Newsletter - October 2021
Indusface Product Newsletter- April 2021
Indusface Product Newsletter-January21
Indusface Product Newsletter - June 20
Indusface Product Newsletter - October 19
Indusface Product Newsletter - August 19
Product Newsletter of May 19
Product Newsletter of March 19
Product Newsletter of January 19
WAF Portal Revamp June 18
Product Newsletter of July 18
Product Newsletter of May 18
Product Newsletter of March 18
Product Newsletter of February 18
Product Newsletter of January 18
Indusface Product Newsletter - March 2022
Indusface Product Newsletter - February 2023
Indusface Product Newsletter- October 2022
Zero Day Vulnerability Reports
Vulnerabilities Detected in 2023
Vulnerability Report of May 23
Vulnerability Report of March 23
Vulnerability Report of August 23
Vulnerability Report of July 23
Vulnerability Report of April 23
Vulnerability Report of November 23
Vulnerability Report of June 23
Vulnerability Report of December 23
Vulnerability Report of February 23
Vulnerability Report of January 23
Vulnerability Report of September 23
Vulnerability Report of October 23
Vulnerabilities Detected in 2016
CRS vs. Zero Day Vulnerability - December 2016
CRS vs. Zero Day Vulnerability - November 2016
CRS vs. Zero Day Vulnerability - October 2016
CRS vs Zero Day Vulnerability - September 2016
CRS Vs Zero Day Vulnerabilities - August 2016
Vulnerabilities Detected in 2017
Vulnerability Report of April 17
Vulnerability report for Apr 3rd - Apr 9th 17
Vulnerability report for April 17th - Apr 23rd 17
Vulnerability report of April 10th - April 16th
Vulnerability Report of March 17
Vulnerability report for Mar 20th - Mar 26th
Vulnerability report for Mar 13th - Mar 19th
Vulnerability report for 27th Feb - 5th Mar
Vulnerability report for Mar 27th - Apr 2nd
Vulnerability report for Mar 6th - Mar 12th
Vulnerability Report of February 17
Vulnerability Report of January 17
Vulnerability Report of December 17
Vulnerability Report of November 17
Vulnerability Report of August 17
Vulnerability Report of September 17
Vulnerability Report of October 17
Vulnerability Report of July 17
Vulnerability Report of June 17
Vulnerability Report of May 17
Vulnerabilities Detected in 2018
Vulnerability Report of December 18
Vulnerability Report of November 18
Vulnerability Report of October 18
Vulnerability Report of September 18
Vulnerability Report of August 18
Vulnerability Report of July 18
Vulnerability Report of June 18
Vulnerability Reports of May 18
Vulnerability Report of April 18
Vulnerability Report of March 18
Vulnerability Report of February 18
Vulnerability Report of January 18
Vulnerabilities Detected in 2019
Vulnerability Report of December 19
Vulnerability Report of November 19
Vulnerability Report of October 19
Vulnerability Report of September 19
Vulnerability Report of August 19
Vulnerability Report of July 19
Vulnerability Report of June 19
Vulnerability Report of May 19
Vulnerability Report of April 19
Vulnerability Report of March 19
Vulnerability Report of February 19
Vulnerability Report of January 19
vulnerabilities Detected in 2020
Vulnerability Report of December 20
Vulnerability Report of November 20
Vulnerability Report of October 20
Vulnerability Report of Sep 20
Vulnerability Report of July 20
Vulnerability Report of June 20
Vulnerability Report of May 20
Vulnerability Report of April 20
Vulnerability Report of March 20
Vulnerability Report of February 20
Vulnerability Report of January 20
Vulnerabilities Detected in 2021
Vulnerability Report of November 21
Vulnerability Report of October 21
Vulnerability Report of September 21
Vulnerability Report of August 21
Vulnerability Report of July 21
Vulnerability Report of June 21
Vulnerability Report of May 21
Vulnerability Report of April 21
Vulnerability Report of March 21
Vulnerability Report of February 21
Vulnerability Report of January 21
Vulnerability Report of December 21
Vulnerabilities Detected in 2022
Vulnerability Report of January 22
Vulnerability Report of February 22
Vulnerability Report of March 22
Vulnerability Report of April 22
Vulnerability Report of May 22
Vulnerability Report of June 22
Vulnerability Report of July 22
Vulnerability Report of August 22
Vulnerability Report of September 22
Vulnerability Report of October 22
Vulnerability Report of November 22
Zero-Day Vulnerability Report - December 2022
Vulnerabilities Detected in 2024
Security Bulletin
Vulnerabilities 2024
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)
ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
CVE-2024-1071 – Critical Vulnerability in Ultimate Member WordPress Plugin
Oracle WebLogic Server Deserialization
ApacheStructs_VG
Apache Struts 2 Vulnerability CVE-2023-50164 Exposed
Unpacking the Zimbra Cross-Site Scripting Vulnerability(CVE-2023-37580)
Adobe ColdFusion Vulnerabilities Exploited in the Wild
Remote Unauthenticated API Access Vulnerabilities in Ivanti
Multiple Moveit Transfer Vulnerabilities
HTTP/2 Rapid Reset Attack Vulnerability
Apache log4j RCE vulnerability
Product Details
API Request to Purge CDN Data
The following document will give the API details of the CDN purge request. Purpose . The purge API helps the users automatically delete the obsolete/cached data which is present in the CDN. API Detai…
BOT Protection
Bot Protection full details
Self Service Rules
This feature helps the customers to create the custom rules in a self-service mode. The following demo gives more details about self service rules:. Custom Rule Categories . Click on the Custom Rule…
Configuring Custom Error Page in AppTrana
Customers have the flexibility to design personalized error pages, which are displayed during security challenges or when an error occurs. This allows the creation of a meaningful error page while pr…
API Discovery Feature
We've released a new feature in AppTrana called "API Discovery, " which will help you quickly identify all your API resources. Here's a 5-min walkthrough video:. The API Security Policies are useful…
API Scan Coverage for OWASP Top 10
Go through the following report for API Scan Coverage for OWASP Top 10 - 2023. API Scan Coverage for OWASP Top 10.pdf
Whitelist Vulnerabilities on the AppTrana WAAP
AppTrana WAAP offers a Vulnerability Whitelisting feature that allows you to exclude non-critical or medium-level vulnerabilities from scan results. This functionality assists in managing your securi…
Analysis page - Attack Trend Visualisation
This page displays the analysis of Attack Logs. Users can easily filter and summarize the data by applying multiple filters. Product Walkthrough - Attack Log Analysis on AppTrana... Attack Logs. This…
Advanced Behavioral DDoS
IP Based System Defined Behavioral DDoS Policy . A set of predefined rules and procedures set to mitigate and respond to DDoS attacks. This policy is designed to protect the web application from bein…
Asset Discovery
Asset discovery in AppTrana involves identifying and cataloging the various assets associated with the web application. These identified assets could be Mobile Apps, APIs or other Web Applications. T…
Customize Application Behavior with Bot Score
AppTrana's Bot Management feature allows users to customize application behavior based on the bot score assigned to Client machines (where the requests originate). This score indicates the likelihood…
Restricted Admin User
AppTrana WAAP offers flexible admin user creation, enabling varied access levels. Restricted Admin Users can perform actions similar to a 'Customer admin' but won't see certain parameters related to…
Enabling SIEM Integration
AppTrana enables its customers to seamlessly integrate logs produced by the WAF with third-party SIEM platforms to provide detailed security event logs and alerts. This integration is accomplished th…
SwyftComply
With the SwyftComply feature, AppTrana customers can receive a clean, zero-vulnerability report within 72 hours. Step 1: Auto Scan & Pentest. To get started with SwyftComply, go to the Detect tab. On…
Analysis page - Access Trend Visualization
This page displays the analysis of Access Logs. Users can easily filter and summarize the data by applying multiple filters. Product Walkthrough - Access (Request) Log Analysis on AppTrana... Access…
Manage WAAP Email Alerts
Too many alerts can make it hard to know what's important. AppTrana WAAP lets you control which alerts you receive, so you can focus on what matters most and avoid feeling overwhelmed. Our Email noti…
Enable and Configure Single Sign-On
Streamline access with Single Sign-On (SSO) on AppTrana WAAP, simplifying login processes for your team and ensuring seamless authentication, eliminating the need for repeated sign-ins. Part 1: Enabl…
WAF Automated Bypass and Unbypass
Overview. Indusface is bound to provide customer-centric 360-degree protection to their Web Applications, ensuring it to be always-available. WAF automated bypass is the disaster recovery mechanism t…
False Positive Analysis Report on WAAP
At AppTrana WAAP, we guarantee zero false positives via surgically accurate security rules. Our commitment to accuracy is evident in our False Positive Analysis feature, which transparently documents…