Violation buffer is on showing on XC WAF. Difficult for us to Analyse if request is false positive or true.
I would like to raise a concern regarding the violation details displayed on the console. The information provided is not sufficiently detailed to identify the exact violation trigger or the violation buffer.
Violation details displayed on the console is not sufficiently detailed to identify the exact violation trigger or the violation buffer.
For example, the violation buffer shared by the SOC team includes both encoded and decoded buffers, whereas the console only shows the decoded buffer. Furthermore, the console displays the violation context as a generic parameter (e.g., “data”), but the SOC’s buffer shows the exact parameter name (e.g., ‘ZGF0YQ==’).
With this limited data on the console, we are unable to perform effective violation assessments with the application team, as we do not have visibility into the exact buffer and parameter involved.
Previously, on the Silverline platform, we had access to the complete violation buffer, similar to what the SOC team currently sees.
Violation details displayed on the console is not sufficiently detailed to identify the exact violation trigger or the violation buffer.
For example, the violation buffer shared by the SOC team includes both encoded and decoded buffers, whereas the console only shows the decoded buffer. Furthermore, the console displays the violation context as a generic parameter (e.g., “data”), but the SOC’s buffer shows the exact parameter name (e.g., ‘ZGF0YQ==’).
With this limited data on the console, we are unable to perform effective violation assessments with the application team, as we do not have visibility into the exact buffer and parameter involved.
Previously, on the Silverline platform, we had access to the complete violation buffer, similar to what the SOC team currently sees.