Investigating - We will be deploying several new signatures during our weekly deploy on August 29th 2018. Full details may be found here: https://live.paloaltonetworks.com/t5/Cloud-Security-Evident-Articles/a/ta-p/227397. If you have any questions please contact our support team at evidentsupport@paloaltonetworks.com
Aug 15, 11:16 PDT
Investigating - An issue has been identified where the "Suppress this signature" and "Suppress this region" options within an alert details page will result in a 500 Internal Server Error. The workaround is to create the suppression from the control panel or this link (https://esp.evident.io/control_panel/suppressions.) If you have any questions, please contact us at https://support.paloaltonetworks.com/.
Aug 14, 10:57 PDT
Identified - An issue has been identified with AZU:GR-002 and AZU:GR-003 where an unexpected volume of INFO alerts are generated. These signatures will be temporarily globally disabled until a fix is released. Please contact Palo Alto Networks support if you have any questions or concerns.
Aug 2, 10:42 PDT
Identified - AZU:NET-001, AZU:NET-002, and AZU:NET-003 will be temporarily globally disabled pending adjustments to their methodology. These signatures are scheduled to be disabled on 3/7/2018.
Mar 5, 10:40 PST

About This Site

Welcome to the status page for the Evident Security Platform for AWS. At Evident.io we are committed to providing transparency around our operations, resiliency, and security and are happy to answer questions on these topics. To submit a question please contact us via our support email address - support@evident.io. Thank you for visiting!

Evident Security Platform API   Operational
Evident Security Platform Web UI   ? Operational
Evident Scanning Engine   Operational
Evident Custom Signature Engine   Operational
Evident Integration Engine   Operational
Evident User Attribution Engine   Operational
Evident Security Platform API (GovCloud)   Operational
Evident Security Platform Web UI (GovCloud)   Operational
Evident Scanning Engine (GovCloud)   Degraded Performance
Evident Custom Signature Engine (GovCloud)   Operational
Evident Integration Engine (GovCloud)   Operational
Evident User Attribution Engine (GovCloud)   Operational
AWS ec2-us-east-1   Operational
AWS ec2-us-east-1   Operational
AWS ec2-us-west-1   Operational
AWS ec2-us-west-2   Operational
AWS rds-us-east-1   Operational
AWS rds-us-west-1   Operational
AWS rds-us-west-2   Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Past Incidents
Aug 19, 2018

No incidents reported today.

Aug 18, 2018

No incidents reported.

Aug 17, 2018

No incidents reported.

Aug 16, 2018

No incidents reported.

Aug 15, 2018
Resolved - The default scan interval has been permanently increased to 30 minutes. Note that this is only for the default scan interval. It is possible to modify the scan intervals of your accounts back to 15 minutes from Control Panel -> External Accounts -> Scan Intervals. If you have any questions please contact us at https://support.paloaltonetworks.com.
Aug 15, 13:58 PDT
Identified - The default scan interval will be permanently increased to 30 minutes. Note that this is only for the default scan interval. It is possible to modify the scan intervals of your accounts back to 15 minutes from Control Panel -> External Accounts -> Scan Intervals. If you have any questions please contact us at https://support.paloaltonetworks.com.
Aug 13, 14:04 PDT
Investigating - We are currently investigating a performance issue with ESP. The default scan interval has been increased to 30 minutes to alleviate the issue. The interval will be changed back to 15 minutes once the issue has been resolved.
May 7, 23:42 PDT
Completed - Our QA team has completed testing and no issues were found. The e-deploy has been finalized.
Aug 15, 13:08 PDT
Verifying - Our e-deploy has been completed and our QA team is currently verifying the update.
Aug 15, 12:20 PDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Aug 15, 11:00 PDT
Scheduled - We will be performing an e-deploy to address a currently open incident related to AWS signature IAM-011. https://status.evident.io/incidents/bmkv388nx5zk . If you have any questions or concerns, please contact our support team at http://support.paloaltonetworks.com
Aug 15, 08:47 PDT
Resolved - This issue has been resolved with today's e-deploy. If you encounter any issues with this signature, please contact support@evident.io.
Aug 15, 12:52 PDT
Identified - An issue has been identified with AWS:IAM-011 where a false alert is generated if the Evident Service Role was set to use the AWS SecurityAudit policy. AWS updated the SecurityAudit policy on 7/30/18, which included 3 additional roles that the current signature does not account for. A fix is being worked on and expected soon. If you have any questions please contact us at https://support.paloaltonetworks.com.
Aug 14, 10:56 PDT
Aug 13, 2018
Completed - Our QA team has completed testing and no issues were found. The e-deploy has been finalized.
Aug 13, 19:07 PDT
Verifying - Our e-deploy has been completed and our QA team is currently verifying the update.
Aug 13, 13:06 PDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Aug 13, 11:00 PDT
Scheduled - We will be performing an e-deploy today to update our Azure signatures that were postponed from our normal scheduled deploy. This release includes fixes to current signatures as well as new signatures. Full details may be found here: https://live.paloaltonetworks.com/t5/Cloud-Security-Evident-Articles/Evident-Updates-August-8-2018/ta-p/222289. If you have any questions please contact us at https://suport.paloaltonetworks.com
Aug 13, 05:39 PDT
Aug 12, 2018

No incidents reported.

Aug 11, 2018

No incidents reported.

Aug 10, 2018

No incidents reported.

Aug 9, 2018
Resolved - New signatures have been deployed. Full details may be found here: https://goo.gl/HFpfU1. If you have any questions please contact our support team at https://support.paloaltonetworks.com/.
Aug 9, 14:40 PDT
Update - The deploy of new signatures has been delayed and is expected to occur on August 8th 2018. Full details may be found here: https://goo.gl/HFpfU1. If you have any questions please contact our support team at evidentsupport@paloaltonetworks.com
Jul 31, 17:03 PDT
Investigating - We will be deploying several new signatures during our weekly deploy on August 1st 2018. Full details may be found here: https://goo.gl/HFpfU1. If you have any questions please contact our support team at evidentsupport@paloaltonetworks.com
Jul 18, 18:49 PDT
Resolved - A fix for this issue has been deployed. Deleting resources in Azure will now properly end related alerts. If you have any further questions or concerns, please contact us at https://support.paloaltonetworks.com/.
Aug 9, 14:36 PDT
Update - We have a potential solution now in QA and will provide additional updates as we approach release.
Feb 14, 10:40 PST
Identified - Currently, if an Azure external account does not have real-time alerting configured, alerts will not end when related resources are deleted. The root cause has been identified and engineering is actively working to fix this. For an immediate workaround you can configure real-time alerting (http://docs.evident.io/#azure-logs).
Nov 17, 11:16 PST
Resolved - A fix for this issue has been deployed. External accounts with shared Client ID will now properly generate alerts. If you have any further questions or concerns, please contact us at https://support.paloaltonetworks.com/.
Aug 9, 14:34 PDT
Investigating - We have identified an issue with alerts when two or more external accounts use the same Azure Client ID and App Registration. Doing so will cause all external accounts with the shared ID and Registration to receive alerts from the one of the subscriptions, but none from the others. We are actively working to identify the root cause and implement a fix. For an immediate workaround, please configure the external accounts with different Client IDs.
Dec 7, 11:21 PST
Completed - The Azure signature updates has been postponed until next Monday 8/13/18. If you have any questions please contact us at https://support.paloaltonetworks.com
Aug 9, 14:25 PDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Aug 9, 11:00 PDT
Scheduled - We will be performing a scheduled deploy today to update our Azure signatures that were postponed from our normal scheduled deploy yesterday. This release includes fixes to current signatures as well as new signatures. Full details may be found here: https://live.paloaltonetworks.com/t5/Cloud-Security-Evident-Articles/Evident-Updates-August-8-2018/ta-p/222289. If you have any questions please contact us at https://suport.paloaltonetworks.com
Aug 9, 10:43 PDT
Aug 8, 2018
Completed - Our QA team has completed testing and no issues were found. The scheduled deploy has been finalized.
Aug 8, 16:19 PDT
Update - Our team has delayed the Azure signature updates until our scheduled deploy tomorrow. No Azure changes are being implemented until Thursday at 11 a.m. PST
Aug 8, 15:13 PDT
Verifying - Our scheduled deploy has been completed and our QA team is currently verifying the update.
Aug 8, 14:04 PDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Aug 8, 11:01 PDT
Scheduled - We will be deploying several updates to our platform this week. Part of this deploy will include new signatures that will generate additional alerts on your dashboard. Full details may be found here: https://live.paloaltonetworks.com/t5/Cloud-Security-Evident-Articles/Evident-Updates-August-8-2018/ta-p/222289. If you have any questions please contact our support team at support@evident.io
Aug 8, 09:54 PDT
Aug 7, 2018

No incidents reported.

Aug 6, 2018

No incidents reported.

Aug 5, 2018

No incidents reported.