Skip to content

Commit 29e71cb

Browse files
fixes
1 parent 3ff3187 commit 29e71cb

File tree

3 files changed

+6
-7
lines changed

3 files changed

+6
-7
lines changed

src/content/docs/bots/additional-configurations/detection-ids/account-takeover-detections.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Using the detection IDs below, you can detect and mitigate account takeover atta
1515
| `201326593` | Observes all login traffic to the zone. |
1616
| `201326598` | Sets a dynamic threshold based on the normal traffic that is unique to the zone.<br /><br /> When the ID matches a login failure, Bot Management sets the [bot score](/bots/concepts/bot-score/) to 29 and uses [anomaly detection](/bots/concepts/bot-detection-engines/#anomaly-detection-enterprise) as its score source. |
1717

18-
### Challenges for account takeover detections
18+
## Challenges for account takeover detections
1919

2020
Cloudflare's [Managed Challenge](/cloudflare-challenges/challenge-types/challenge-pages/#managed-challenge-recommended) can limit brute-force attacks on your login endpoints.
2121

@@ -48,7 +48,7 @@ To access account takeover detections:
4848
(any(cf.bot_management.detection_ids[*] eq 201326593))
4949
```
5050

51-
### Limit logins with account takeover detections
51+
## Limit logins with account takeover detections
5252

5353
Rate limiting rules can limit the number of logins from a particular IP, JA4 fingerprint, or country.
5454

src/content/docs/bots/additional-configurations/detection-ids/additional-detections.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,6 @@ sidebar:
55
order: 4
66
---
77

8-
## Additional detections
9-
108
| Detection ID | Description |
119
| ------------ | ---------------------------------------- |
1210
| `50331651` | Observes traffic from residential proxy networks and similar commercial proxies. <br /><br />When the ID matches a request, Bot Management sets the bot score to 29 and uses [anomaly detection](/bots/concepts/bot-detection-engines/#anomaly-detection-enterprise) as its score source. |

src/content/docs/bots/additional-configurations/detection-ids/scraping-detections.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ To access scraping detections:
3636

3737
<DashButton url="/?to=/:account/:zone/security/security-rules" />
3838
2. Select **Create rule** and choose **Custom rule**.
39-
4. Fill out the form using **Bot Detection IDs** along with other necessary information.
40-
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
39+
3. Fill out the form using **Bot Detection IDs** along with other necessary information.
40+
4. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
4141
</Steps>
4242
</TabItem>
4343
</Tabs>
@@ -73,12 +73,13 @@ To use rate limiting rules with scraping detections:
7373

7474
<DashButton url="/?to=/:account/:zone/security/security-rules" />
7575
2. Select **Create rule** and choose **Rate limiting rule**.
76-
3.Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
76+
3. Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
7777
4. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
7878
</Steps>
7979
</TabItem>
8080
</Tabs>
8181

8282
:::note
8383
Detection IDs `50331648` and `50331649` are dynamically re-calculated, meaning a single fingerprint would not be permanently rate limited unless it continues to remain suspicious at all times. Rate limiting on these detection IDs allows for more lenient controls, as opposed to immediately challenging or blocking.
84+
8485
:::

0 commit comments

Comments
 (0)