The WAAP dashboard in Traceable provides insights into Web Application Protection (WAF), API Protection, and Custom Policies data within your Traceable account. These dashboards simplify analytics monitoring by presenting information in an organized, visual format, allowing you to track traffic behavior, threat types, threat sources, and top-attacked destinations.
What are the available Dashboards?
Traceable offers the following pre-configured dashboards:
WAP (Web Application Protection)
API Protection
Custom Policies

WAAP Dashboard
These dashboards are populated with widgets displaying analytics aggregated from various components within Protection. For more information, see the tabs under WAAP Dashboards.
Can I adjust the Dashboard to see data for a specific period and environment?
Yes, you can adjust the data visibility on the dashboard. By default, Traceable shows the data in the dashboard for the Last 1 day across All Environments. You can modify these values to view the insights for up to 90 days according to your requirements. For example, let us say you wish to view data for the Production environment for the Last 1 week. Then, from the top right corner of the WAAP Dashboard, you can select Production from the Environments drop-down and Last 1 week from the Duration drop-down.
Traceable updates the data shown in the widgets according to the selected configurations.
Can I customize the Dashboard?
You can also perform multiple actions on the dashboard, such as add, modify, delete widgets, etc. For more information, see Actions. As part of these actions, Traceable also allows you to customize the dashboard and tailor widget configurations according to your requirements to ensure flexibility. For more information, see Customizations.
How are the Dashboards useful?
By leveraging the customizable widgets and environment-specific views, you can focus on the dashboard's insights, investigate incidents, and make informed security decisions. You can also use these insights to enable or disable pre-defined policies and create custom policies according to your requirements. For more information, see Policies.
WAAP Dashboards
The following tabs explain the multiple dashboards available as part of the WAAP dashboard and how they can be useful to you. Click the tab according to your requirements to understand each dashboard.
While these dashboards are pre-configured, you can perform multiple actions and customizations according to your requirements. For more information, see Actions and Customizations.
The WAP and API Protection dashboards provide insights into the threat data based on the WAF and API Protection policies you enabled under the Protection → Settings → Policies → WAP or API Protection tabs. You can use these dashboards to monitor, analyze, and act on potential threats targeting your APIs and Web Applications.
The widgets in these dashboards are designed based on the common use cases, ensuring immediate usability. While the dashboard shows metrics in these widgets, you can hover over the shown values and click the Drilldown () icon to view detailed information about the metric.
By default, Traceable divides the widgets into the following categories:
Summary Metrics
Shows Univariate charts for the following:Total Traffic — The total count of traffic processed. Traceable calculates this value using the unique span IDs. For more information on these spans, see Explorer.
Total Threat Traffic — The count of traffic being considered malicious/threat. Traffic is considered malicious if assigned the Blocked or Monitored status.
Monitored Threat Traffic — The count of threat traffic out of the total traffic that is being logged (monitored), and not blocked. Traceable considers traffic monitored if it is assigned the Monitored status.
Blocked Threat Traffic — The count of threats being actively blocked. Traffic is considered blocked if it is assigned the Blocked status.
How is it useful?
These metrics provide insights into traffic volume and threats, allowing you to assess the amount of malicious activity being monitored or blocked.
Traffic Distribution
Drills down on the traffic distribution and shows a Time-Series chart that compares the total traffic and the threat traffic. The following types of traffic are shown in the widget:Traffic — The total traffic received.
Threat traffic — The traffic is considered malicious.
Monitored Threat Traffic — The traffic being logged (monitored), but not blocked.
Blocked Threat Traffic — The traffic being blocked.
Hovering over it also shows the count of the above traffic at a particular time.
How is it useful?This chart provides insights into traffic spikes, which you can correlate with attack attempts, and determine the most malicious activity time.
Threat Classification and Events by Vulnerability Taxonomies
Drills down on the threat classifications and shows Donut charts with the threat counts categorized by:OWASP 2021 — The OWASP API Security Top 10 threats.
CVE — The known CVE classifications.
CWE — The threats mapped to CWE classifications.
How is it useful?
These charts provide insights into the common industry threats detected by the policies, allowing you to prioritize mitigations according to your requirements.Top Threat Types Distribution
Drills down on the threat types and shows Time Series and Donut charts with the count of threats, grouped by these threat types. For example, the above image shows charts for threat types like Local File Inclusion, Remote Code Execution, etc.
How is it useful?
These charts provide insights into the top 5 attacks affecting your traffic and help security teams prioritize their resolutions accordingly.Top Threat Rules Distribution
Drills down on the threat rules and shows a Time Series and Donut chart with the count of threat rules triggered over time. For example, the above image shows charts for threat rules like Restricted File Access Attempt, Path Traversal Attack, etc.
How is it useful?
These charts provide insights into the security rules being triggered most often so that you can fine-tune them according to your requirements. For more information, see Policies.Top Threat Sources Distribution
Drills down on the threat sources dustribution and shows Table charts with event counts categorized by:Actor ID — The user identifier of attackers.
IP Organization and ASN — Identifies attacks by the ISP or organization.
Country — The countries from which the attacks originate.
How is it useful?These charts provide insights into the regions of attack origination, actors posing a threat repeatedly, and high-risk countries. Based on these insights, you can fine-tune Policies to block attacks.
Top Attacked Destinations
Drills down on the top attacked destinations and shows Table charts with event counts categorized by:Endpoints — The API endpoints being attacked.
Services — The Services being attacked.
Domains — The Domains being attacked.
How is it useful?
These charts provide insights into the vulnerable APIs, services, and domains, using which you can fine-tune Policies for protection.
The Custom Policies dashboard provides insights into the threat data based on the Custom policies you have created under the Protection → Settings → Policies → Custom Policies tab. You can use this dashboard to monitor and analyze threats and fine-tune the custom policies according to your requirements.
The widgets in these dashboards are designed based on the custom policy types, ensuring immediate usability. While the dashboard shows metrics in these widgets, you can hover over the shown values and click the Drilldown () icon to view detailed information about the metric.
By default, Traceable divides the widgets into the following categories:
Summary Metrics
Shows Univariate charts for the following:Total Traffic — The count of total traffic processed. Traceable calculates this value using the unique span IDs. For more information on these spans, see Explorer.
Total Threat Traffic — The count of traffic being considered malicious/threat. Traceable considers traffic malicious if assigned the Blocked or Monitored status.
Monitored Threat Traffic — The count of threat traffic out of the total traffic that is being logged (monitored), and not blocked. Traceable considers traffic monitored if it is assigned the Monitored status.
Blocked Threat Traffic — The count of threats being actively blocked. Traceable considers traffic blocked if it is assigned the Blocked status.
How is it useful?
These metrics provide insights into the traffic volume and threats, using which you can assess the amount of malicious activity being monitored or blocked.
Traffic Distribution
Drills down on the above Summary Metrics and shows a Time-Series chart that compares the total traffic and the threat traffic. The following types of traffic is shown in the widget:Traffic — The total traffic received.
Threat traffic — The traffic considered malicious.
Monitored Threat Traffic — The traffic being monitored/analyzed.
Blocked Threat Traffic — The traffic being blocked.
Upon hovering, it also shows the count of the above traffic at a particular time.
How is it useful?This chart provides insights into traffic spikes, which you can correlate with attack attempts, and determine the time having the most malicious activity.
Top Malicious Sources Distribution
Shows a Time Series and Donut chart with the count of malicious source rules triggered over time.
How is it useful?
These charts provide insights into the policies being triggered most often so that you can fine-tune them according to your requirements. For more information, see Policies.Top Custom Signature Distribution
Shows a Time Series and Donut chart with the count of custom signature rules triggered over time.
How is it useful?
These charts provide insights into the policies being triggered most often so that you can fine-tune them according to your requirements. For more information, see Policies.Top Rate Limiting Distribution
Shows a Time Series and Donut chart with the count of rate-limiting rules triggered over time.
How is it useful?
These charts provide insights into the policies being triggered most often so that you can fine-tune them according to your requirements. For more information, see Policies.Top Data Loss Prevention Distribution
Shows a Time Series and Donut chart with the count of data loss prevention (DLP) rules triggered over time.
How is it useful?
These charts provide insights into the policies being triggered most often so that you can fine-tune them according to your requirements. For more information, see Policies.Top Enumeration Distribution
Shows a Time Series and Donut chart with the count of enumeration rules triggered over time.
How is it useful?
These charts provide insights into the policies being triggered most often so that you can fine-tune them according to your requirements. For more information, see Policies.Top Threat Sources Distribution
Shows Table charts with event counts categorized by:Actor ID — The user identifier of attackers.
IP Organization and ASN — Identifies attacks by the IP Org and ASN.
Country — The countries from which the attacks originate.
How is it useful?These charts provide insights into the regions of attack origination, actors posing a threat repeatedly, and high-risk countries. Based on these insights, you can create Custom Policies to block attacks.
Top Attacked Destinations
Shows Table charts with event counts categorized by:Endpoints — The API endpoints being attacked.
Services — The Services being attacked.
Domains — The Domains being attacked.
How is it useful?
These charts provide insights into the vulnerable APIs, services, and domains, using which you can set up Custom Policies for protection.