Radware CWAF collector
Overview
Radware's Cloud WAF Service is a web application firewall that provides continuous adaptive web application security protection and full coverage.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Allowed source events obfuscation |
|
Requires IP whitelisting |
|
Data sources
Data source | Description | API endpoint | Collector service name | Devo table | Available from release |
Get User Activity Log List | Customers can monitor changes in their Cloud WAF applications using the Activity log. Any change in the configuration is logged in the Activity Log, including the time and the user that performed the change. |
|
|
| v1.0.0 |
Get Security Events List | Security events are the events reported by WAF when an attack is detected. This allows user visibility to the protected traffic, refinement of false positives, and detailed explanations of security attacks. |
|
|
| v1.0.0 |
For more information on how the events are parsed, visit our page.
Flattening preprocessing
Data source | Collector service | Optional | Flattening details |
---|---|---|---|
Get User Activity Log List |
| yes | not required |
Get Security Events List |
| yes | not required |
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details.
Setting | Details |
---|---|
username | The username for the Radware API. To find out how to get it, see the Vendor Setup guide. |
password | The password for the Radware API. To find out how to get it, see the Vendor Setup guide. |
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method.
Accepted authentication methods
Authentication method | username | password |
---|---|---|
token | REQUIRED | REQUIRED |
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Collector services detail
This section is intended to explain how to proceed with specific actions for services.
Collector operations
This section is intended to explain how to proceed with specific operations of this collector.
Change log
Release | Released on | Release type | Details | Recommendations |
---|---|---|---|---|
| Aug 19, 2024 | NEW FEATURE |
|
|