03 Mar 2023 10:08 PM - last edited on 06 Mar 2023 08:46 AM by MaciejNeumann
Our firm is utilizing a security tool called Imperva to protect the website against bad bots and DDoS attacks, but it is scanning our synthetics as bad bots. Has anyone come across this issue and if so what are some solutions that can be proposed?
The security team and Imperva are reluctant to white list the IP ranges of the synthetic ActiveGates.
Also, does anyone know if browser click paths have certain request attributes that Dynatrace adds when executing that we can add to the Imperva exception list?
Solved! Go to Solution.
05 Mar 2023 09:40 AM
I have had this issue with another solution that is not Imperva. There are two main reasons why Imperva might be signalling this, in my opinion:
29 Jun 2023 07:30 PM
Hi Antonio,
Thanks for the reply. This issue is coming up again from Imperva.
So to first reply to your points:
Does Dynatrace work with security vendors like Imperva to make synthetics be seen as a good bot? I see that they have other vendors that can be selected to seen as a good bot like logicmonitor, pingdom, but Dynatrace is not one. I would think Dynatrace as one of the leading industry observability platforms would be part of the Imperva Bot Protection "good bot" category.
06 Mar 2023 11:51 AM
Most tools use the User Agent string to define if it's a bot or not.
For Browser Monitors, we add RuxitSynthetic/1.0 to the User Agent string and for HTTP Monitors we add DynatraceSynthetic/{version}, so I would just add a rule for DynatraceSynthetic/ as the version will change every time you update your ActiveGates or we update the Public location versions