Customer Pain Points
“Gap” in security protection after new business launch
A financial company launched a new business system; the O&M team had to manually add the server IP to the WAF whitelist. Due to the cumbersome approval process, the configuration was not completed until 3 days later. During this period, hackers had invaded the server through vulnerability scanning.
“Zombie servers” left by ex-employee become attack vectors
At an internet company, a former O&M employee left behind unmanaged test servers. Since these servers were not registered in the WAF asset inventory, they became entry points for crypto-mining attacks.
Self-deployed Servers in Branch Office Not Included in HQ’s Defense System
A branch office of an enterprise independently deployed several business servers without reporting to HQ. As these servers were outside the WAF protection scope, attackers used them to penetrate the core business systems.
NSFOCUS WAF New Version
To address issues like delayed asset registration and difficult asset management, the new WAF V6.0R09F00 introduces an asset self-identification feature. It automatically detects newly launched servers’ IPs, ports, domain names and other details, enabling quick one-click integration into protection. This ensures business iteration remains unaffected while mitigating hidden risks from “shadow IT” and improving O&M efficiency.
Function Guide
1. Configure Asset Identification Scope
Enter [Site Management], create a site and configure the IP and port range to be identified. Set the discovery cycle in [Site Discovery] and turn on the automatic identification switch.

2. Quick Integration into Protection
Select the specified site, click “Add as Protection Site”, and complete the protection configuration with one-click confirmation. Support batch addition and deletion to improve management efficiency.



For more information or trial inquiry, please contact our regional team.