You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The AI Labyrinth adds invisible links on your webpage with specific `Nofollow` tags to block AI crawlers that do not adhere to the recommended guidelines and crawl without permission. AI crawlers that scrape your website content without permission will be stuck in a maze of never-ending links, and their details are recorded and used by all Cloudflare customers who choose to block [AI bots](/bots/concepts/bot/#ai-bots).
11
11
12
12
These links do not impact your search engine optimization (SEO) or your website's appearance, and are only seen by bots. AI bots that respect no-crawl instructions will safely ignore this honeypot.
13
13
14
-
To enable [AI Labyrinth](/bots/additional-configurations/ai-labyrinth) based on your plan:
14
+
To enable [AI Labyrinth](/bots/additional-configurations/ai-labyrinth):
@@ -40,26 +40,43 @@ You can create or edit existing Logpush jobs to include the new Bot Detection ID
40
40
41
41
### Via the Cloudflare dashboard
42
42
43
-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account and domain.
43
+
<Steps>
44
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
44
45
2. Go to **Analytics & Logs** > **Logs**.
45
46
3. Select **Add Logpush Job**.
46
47
4. Select **HTTP Requests** as the dataset.
47
48
5. Select **BotDetectionIDs** under the General data field category.
48
49
6. Select and enter the destination information.
49
50
7. Prove the ownership.
50
51
8. Select **Save**.
52
+
</Steps>
51
53
52
54
### Via the API
53
55
54
56
[Update your logpush job](/logs/reference/log-output-options/) by adding `BotDetectionIDs` to the `output_options:` parameters.
55
57
56
58
## Create or edit an expression
57
59
58
-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account and domain.
59
-
2. Go to **Security** > **Bots**, apply filters and select **Create custom rule** to create a [custom rule](/waf/custom-rules/create-dashboard/) based on those filters.
60
-
- Alternatively, if you already created a custom rule, go to **Security** > **WAF** > **Custom rules** and edit the expression of an existing custom rule.
61
-
3. Use the `cf.bot_management.detection_ids` field in the rule expression.
62
-
4. Select **Save**.
60
+
<TabssyncKey="dashNewNav">
61
+
<TabItemlabel="Old dashboard">
62
+
<Steps>
63
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
64
+
2. Go to **Security** > **Bots**, apply filters and select **Create custom rule** to create a [custom rule](/waf/custom-rules/create-dashboard/) based on those filters. Alternatively, if you already created a custom rule, go to **Security** > **WAF** > **Custom rules** and edit the expression of an existing custom rule.
65
+
3. Use the `cf.bot_management.detection_ids` field in the rule expression.
66
+
4. Select **Save**.
67
+
</Steps>
68
+
</TabItem>
69
+
<TabItemlabel="New dashboard"icon="rocket">
70
+
<Steps>
71
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain.
72
+
2. Go to **Security** > **Analytics**.
73
+
3. Apply filters and select **Create custom security rule** to create a custom rule based on your filters. Alternatively, if you have already created a custom rule, you can go to the existing rule in **Security** > **Security rules** and edit the expression based on your filters.
74
+
4. Use the `cf.bot_management.detection_ids` field in the rule expression.
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account and domain.
96
-
2. Go to **Security** > **WAF**.
97
-
3. Under **Custom Rules**, select **Create rule**.
98
-
4. Fill out the form using **Bot Detection IDs** along with other necessary information.
99
-
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
112
+
<TabssyncKey="dashNewNav">
113
+
<TabItemlabel="Old dashboard">
114
+
<Steps>
115
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
116
+
2. Go to **Security** > **WAF**.
117
+
3. Under **Custom Rules**, select **Create rule**.
118
+
4. Fill out the form using **Bot Detection IDs** along with other necessary information.
119
+
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
120
+
</Steps>
121
+
</TabItem>
122
+
<TabItemlabel="New dashboard"icon="rocket">
123
+
<Steps>
124
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain.
125
+
2. Go to **Security** > **Security rules**.
126
+
3. Select **Create rule** and choose **Custom rule**.
127
+
4. Fill out the form using **Bot Detection IDs** along with other necessary information.
128
+
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
129
+
</Steps>
130
+
</TabItem>
131
+
</Tabs>
100
132
101
133
```js title="Rule example"
102
134
@@ -109,11 +141,26 @@ Rate limiting rules can limit the number of logins from a particular IP, JA4 Fin
109
141
110
142
To use rate limiting rules with account takeover detections:
111
143
112
-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account and domain.
113
-
2. Go to ***Security** > **WAF**.
114
-
3. Under **Rate limiting rules**, select **Create rule**.
115
-
4. Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
116
-
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
144
+
<TabssyncKey="dashNewNav">
145
+
<TabItemlabel="Old dashboard">
146
+
<Steps>
147
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
148
+
2. Go to **Security** > **WAF**.
149
+
3. Under **Rate limiting rules**, select **Create rule**.
150
+
4. Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
151
+
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
152
+
</Steps>
153
+
</TabItem>
154
+
<TabItemlabel="New dashboard"icon="rocket">
155
+
<Steps>
156
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain.
157
+
2. Go to **Security** > **Security rules**.
158
+
3. Select **Create rule** and choose **Rate limiting rule**.
159
+
4. Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
160
+
5. Select **Save as draft** to return to it later, or **Deploy** to deploy the rule.
161
+
</Steps>
162
+
</TabItem>
163
+
</Tabs>
117
164
118
165
:::note
119
166
The rule can be enhanced with Leaked Credential Checks. Refer to the [WAF documentation](/waf/detections/leaked-credentials/) for more information on how to include leaked credentials and account takeover detections in a rate limiting rule.
Protect your website or application from AI crawlers by implementing a `robots.txt` file on your domain to direct AI bot operators on what content they can and cannot scrape for AI model training.
12
12
@@ -45,27 +45,26 @@ If your website does not have a `robots.txt` file, Cloudflare creates a new file
45
45
46
46
## Implementation
47
47
48
-
To implement a `robots.txt` file on your domain based on your plan:
49
-
50
-
<Tabs>
51
-
<TabItemlabel="Bot Fight Mode">
52
-
<Render
53
-
file="enable-managed-robots-txt"
54
-
params={{ one: "Bot Fight Mode" }}
55
-
/>
56
-
</TabItem>
57
-
<TabItemlabel="Super Bot Fight Mode">
58
-
<Render
59
-
file="enable-managed-robots-txt"
60
-
params={{ one: "Super Bot Fight Mode" }}
61
-
/>
62
-
</TabItem>
63
-
<TabItemlabel="Bot Management for Enterprise">
64
-
<Render
65
-
file="enable-managed-robots-txt"
66
-
params={{ one: "Bot Management" }}
67
-
/>
68
-
</TabItem>
48
+
To implement a `robots.txt` file on your domain:
49
+
50
+
<TabssyncKey="dashNewNav">
51
+
<TabItemlabel="Old dashboard">
52
+
<Steps>
53
+
<Render
54
+
file="enable-managed-robots-txt"
55
+
params={{ one: "Bot Fight Mode" }}
56
+
/>
57
+
</Steps>
58
+
</TabItem>
59
+
<TabItemlabel="New dashboard"icon="rocket">
60
+
<Steps>
61
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain.
@@ -20,14 +20,17 @@ Sequence rules is currently in private beta. If you would like to be included in
20
20
21
21
## Enable sequence rules via the API
22
22
23
+
<Steps>
23
24
1.[Create an API token](/fundamentals/api/get-started/create-token/) if you do not already have one. The API token must include the _Zone_ > _Fraud Detection_ > _Edit_ permission.
24
25
2.[Get the zone ID](/fundamentals/account/find-account-and-zone-ids/) for the zone(s) where you want to enable sequence rules.
25
26
3.[Add the endpoints](/api-shield/management-and-monitoring/) that you want to track in your sequence rules using API Shield's Endpoint Management and make note of the short ID.
26
-
:::note
27
-
28
-
The short ID will not be visible until our account team has enabled this feature for you.
29
-
:::
30
27
4. Enable the sequence cookie by adding your API token and zone ID to the following API call.
28
+
</Steps>
29
+
30
+
:::note
31
+
32
+
The short ID will not be visible until your account team has enabled this feature for you.
5. Use the expression editor to write sequence or timing based rules via [custom rules](/waf/custom-rules/), [rate limiting rules](/waf/rate-limiting-rules/), or [transform rules](/rules/transform/). You can put these rules in log only mode to monitor.
41
44
42
45
:::note
43
-
44
46
When you enable sequence rules, Cloudflare will start setting cookies for all requests that match your endpoints.
45
47
:::
46
48
@@ -92,16 +94,16 @@ Disabling sequence rules will stop the rules fields from being populated. If you
92
94
93
95
To disable sequence rules:
94
96
97
+
<Steps>
95
98
1.[Create an API token](/fundamentals/api/get-started/create-token/) if you do not already have one. The API token must include the _Zone_ > _Fraud Detection_ > _Edit_ permission.
96
99
2.[Get the zone ID](/fundamentals/account/find-account-and-zone-ids/) for the zone(s) where you want to enable sequence rules.
97
100
3.[Add the endpoints](/api-shield/management-and-monitoring/) that you want to track in your sequence rules using API Shield's Endpoint Management and make note of the short ID.
98
-
99
-
:::note
100
-
101
-
The short ID will not be visible until our account team has enabled this feature for you.
102
-
:::
103
-
104
101
4. Disable the sequence cookie using your API token, zone ID, and by setting `enabled` to `false` on the following API call.
102
+
</Steps>
103
+
104
+
:::note
105
+
The short ID will not be visible until your account team has enabled this feature for you.
106
+
:::
105
107
106
108
```bash title="API call"
107
109
curl --request PUT https://api.cloudflare.com/client/v4/zones/{zone_id}/fraud_detection/sequence_cookies \
Pro, Business, and Enterprise customers can use Cloudflare's bot solutions to protect their <GlossaryTooltipterm="static content">static resources</GlossaryTooltip> from bots.
12
12
@@ -19,9 +19,25 @@ If you enable static resource protection, you may block good bots — like mail
19
19
20
20
To enable this feature as a Pro or Business customer or an Enterprise customer without Bot Management:
21
21
22
-
1. Go to **Security** > **Bots**.
23
-
2. Select **Configure Super Bot Fight Mode**.
24
-
3. For **Static resource protection**, select **On**.
22
+
<TabssyncKey="dashNewNav">
23
+
<TabItemlabel="Old dashboard">
24
+
<Steps>
25
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain.
26
+
2. Go to **Security** > **Bots**.
27
+
3. Select **Configure Super Bot Fight Mode**.
28
+
4. For **Static resource protection**, select **On**.
29
+
</Steps>
30
+
</TabItem>
31
+
<TabItemlabel="New dashboard"icon="rocket">
32
+
<Steps>
33
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain.
34
+
2. Go to **Security** > **Settings**.
35
+
3. Filter by **Bot traffic**.
36
+
4. Go to **Super Bot Fight Mode**.
37
+
5. Under **Configurations**, select the edit icon for **Static resource protection** and turn it on.
Copy file name to clipboardExpand all lines: src/content/docs/bots/concepts/bot/verified-bots/policy.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ In order to be listed by Cloudflare as a <GlossaryTooltip term="verified bot" li
15
15
16
16
### Minimum Traffic
17
17
18
-
A bot or proxy must have a minimum amount of traffic for Cloudflare to be able find it in the sampled data. The minimum traffic should have more than 1000 requests per day across multiple domains.
18
+
A bot or proxy must have a minimum amount of traffic for Cloudflare to be able to find it in the sampled data. The minimum traffic should have more than 1,000 requests per day across multiple domains.
0 commit comments