You are on page 1of 1

Description

Client Side Integrity


Defense
Sends a JavaScript challenge to determine whether the client is a legal
browser or an illegal script. Only used when the Operation Mode is set
to Blocking.
CAPTCHA Challenge Issues a CAPTCHA challenge to the traffic identified as
suspicious by
source IP address, geolocation, URL, or site wide.
Request Blocking Specifies how and when to block (if the operation mode is set to
Blocking) or report (if the operation mode is set to Transparent)
suspicious requests. Select Block All to block all suspicious requests or
Rate Limit to reduce the number of suspicious requests.
9. For the Behavioral Detection and Mitigation settings, specify how to mitigate
DDoS attacks
discovered based on behavior.
Option Description
Bad actors behavior
detection
Lets the system identify IP addresses of bad actors by examining traffic
behavior and anomaly detection.
Request signatures
detection
Examines requests and creates behavioral signatures describe patterns
found in attacks the system has identified. Select Use approved
signatures only if you want to verify that the system-generated
signatures are valid before letting the system use them.
Mitigation Specifies the level of mitigation to perform for attacks discovered
using
behavioral DoS.
• Conservative Protection: If Bad actors behavior detection is
enabled, slows down and rate limits requests from anomalous IP
addresses based on anomaly detection confidence and server health.
If Request signatures detection is enabled, blocks requests that
match behavioral signatures.
• Standard Protection: If Bad actors behavior detection is enabled,
slows down requests from anomalous IP addresses based on its
anomaly detection confidence and server health. Rate limits requests
from anomalous IP addresses and, if necessary, rate limits all
requests based on server health. Limits the number of concurrent
connections from anomalous IP addresses and, if necessary, limits
the number of all concurrent connections based on server health. If
Request signatures detection is enabled, blocks requests that match
behavioral signatures.
• Aggressive Protection: If Bad actors behavior detection is
enabled, does all that standard protection does plus it proactively
performs all protection actions (even before an attack). Increases the

You might also like