...
An analyst wants to detect malicious network traffic in web applications. Using the WAF ACL SQS collector to send firewall logs to Devo, the analyst will find malicious IP activity. As a result, the analyst will use Access Control Lists to block the traffic, preventing attackers from cross-site scripting.
...