WAAS Analytics
Table of Contents
Self.Hosted 22.06 (EoL)
Expand all | Collapse all
-
- Getting started
- System Requirements
- Prisma Cloud container images
- Onebox
- Kubernetes
- OpenShift v4
- Console on Fargate
- Amazon ECS
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- IBM Kubernetes Service (IKS)
- Windows
- Defender types
- Cluster Context
-
- Install a single Container Defender
- Automatically Install Container Defender in a Cluster
- App-Embedded Defender
- App-Embedded Defender for Fargate
- Default setting for App-Embedded Defender file system protection
- VMware Tanzu Application Service (TAS) Defender
- Serverless Defender
- Serverless Defender as a Lambda layer
- Auto-defend serverless functions
- Install a single Host Defender
- Auto-defend hosts
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Decommission Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Rule ordering and pattern matching
- Backup and restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure Agentless Scanning
- Agentless Scanning Modes
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
- Credentials store
- Cloud accounts
-
- Prisma Cloud vulnerability feed
- Vulnerability Explorer
- Vulnerability management rules
- Search CVEs
- Scan reports
- Scanning procedure
- Customize image scanning
- Configure Registry Scans
-
- Scan Images in Sonatype Nexus Registry
- Scan images in Alibaba Cloud Container Registry
- Scan images in Amazon EC2 Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan images in Docker Registry v2 (including Docker Hub)
- Scan images in Google Artifact Registry
- Scan images in Google Container Registry (GCR)
- Scan images in Harbor Registry
- Scan images in IBM Cloud Container Registry
- Scan images in Artifactory Docker Registry
- Scan images in OpenShift integrated Docker registry
- Trigger registry scans with Webhooks
- Base images
- Configure VM image scanning
- Configure code repository scanning
- Agentless scanning
- Malware scanning
- Vulnerability risk tree
- Vulnerabilities Detection
- CVSS scoring
- Windows container image scanning
- Serverless function scanning
- VMware Tanzu blobstore scanning
- Scan App-Embedded workloads
- Troubleshoot vulnerability detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- Cloud discovery
- OSS license management
- API
End-of-Life (EoL)
WAAS Analytics
WAAS analytics provide users a way to investigate events and rule triggers.

- For container WAAS events go toMonitor > Events > WAAS for containers
- For host WAAS events go toMonitor > Events > WAAS for hosts
- For App-Embedded WAAS events go toMonitor > Events > WAAS for App-Embedded
- For serverless WAAS events go toMonitor > Events > WAAS for Serverless
WAAS retains up to 200,000 events for each type (container, hosts, app-embedded and serverless) or or a total of 200MB in log size. Once the limit is reached, oldest events will get over-written by new ones.
Similar audits are aggregated and grouped into a single event when received in close succession (less than 5 minutes apart). Audits are aggregated by a combination of IP, HTTP hostname, path, HTTP method, User-Agent and attack type.
Analytics workflow

WAAS analytics allows for the review of incidents by analyzing events across various dimensions, inspecting individual requests, and applying filtering to focus on common characteristics or trends.
Event graph

Each column on the timeline graph represents a dynamic period - hover over a column to reveal its start, end and event count.
The date filter can be adjusted by holding and selecting sections on the timeline graph.
Filters
Filter can be adjusted by using the filtering line:

Once set, the filters would apply on the graph and aggregation view.
You can dynamically update the date filter by selecting an area in the chart.
Click in the chart area, hold the mouse button down, and draw a rectangle over the time frame of interest.
The date filter is automatically updated to reflect your selection.
Aggregation view

The aggregation view can be altered to group audits based on various data dimensions by clicking on the
button.

Users can add up to 6 dimensions to the aggregation and the Total column will be updated dynamically.
By default, aggregation view is sorted by the "Total" column. Sorting can be changed by clicking a column name.
Click on a line in the aggregation view to inspect the requests group by it.
Request view

Request view details all of the requests group by each line of the aggregated view.
Clicking on a column name will sort the table in the upper section and using the
button will add/remove columns.

For each request the following data points are available:
Audit data:
- Time- timestamp of the audit.
- Effect- effect set by policy.
- Request Count- If audits are received in close succession (less than 5 minutes apart) they are aggregated and grouped into one event. This field specifies the number of aggregated requests.
- Rule Name- name of the WAAS rule that matched the request and generated the event. Navigate to the configuration of the rule by clicking on the link.
- Rule app ID- corresponding app ID in the WAAS rule which triggered the event. Navigate to the configuration of the app ID by clicking on the link.
- Attack Type- attack type.
- ATT&CK technique- mapping to the techniques in the ATT&CK framework.
- Container / Host / App / Function Details- These fields include the id and name of the protected entity.
Forensics:
- Forensic Message- details on what caused the rule to trigger - payload content, location and additional relevant information.
- Add as exception- By clicking on the link, you can add an exception in the rule app ID for the attack type that triggered. The exception will be based on the location of the matched payload.
The "Add as exception" link may not be available for events created by rules and apps that no longer exist, as well as for events created in releases that predate the Iverson release.
HTTP request:
- Method- HTTP method used in the request.
- User-Agent- value of the User-Agent HTTP header.
- Host- hostname specified in the Host HTTP header or the host part of the URL.
- URL- full request urls (host and path) shown in a URL decoded or encoded form.
- Path- path element from the request URI.
- Query- query string.
- Header Names- list of the HTTP header names included in the request (sorted alphabetically).
Attacker:
- Add IPs to Network List- Adds the attacker IP either to a new network list or to an existing one. To accessNetwork Lists, open Console, go toDefend > WAASand select theNetwork Listtab.
- Source IP- IP address from which the request originated. If an X-Forwarded-For header was included in the HTTP headers, source IP field will detail the first IP listed in the header value (true client IP).
- Source Country- source country associated with the source IP.
- Connecting IPs- entire connectivity chain, including true client IP and any transparent proxies listed in the HTTP request.
Users can user the Raw button to view the HTTP request in it’s raw form:
