03 Mar 2023
02:08 PM
- last edited on
06 Mar 2023
12:46 AM
by
MaciejNeumann
Our firm is utilizing a security tool called Imperva to protect the website against bad bots and DDoS attacks, but it is scanning our synthetics as bad bots. Has anyone come across this issue and if so what are some solutions that can be proposed?
The security team and Imperva are reluctant to white list the IP ranges of the synthetic ActiveGates.
Also, does anyone know if browser click paths have certain request attributes that Dynatrace adds when executing that we can add to the Imperva exception list?
Solved! Go to Solution.
I have had this issue with another solution that is not Imperva. There are two main reasons why Imperva might be signalling this, in my opinion:
Most tools use the User Agent string to define if it's a bot or not.
For Browser Monitors, we add RuxitSynthetic/1.0 to the User Agent string and for HTTP Monitors we add DynatraceSynthetic/{version}, so I would just add a rule for DynatraceSynthetic/ as the version will change every time you update your ActiveGates or we update the Public location versions