Skip to content

Commit 8a682c3

Browse files
authored
[WAF] Small updates in Security Analytics (#20743)
1 parent 14811d0 commit 8a682c3

File tree

2 files changed

+19
-16
lines changed

2 files changed

+19
-16
lines changed

src/content/docs/waf/analytics/security-analytics.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ The main chart displays the following data for the selected time frame, accordin
110110

111111
- **Attack likelihood**: [WAF attack score](/waf/detections/attack-score/) analysis of incoming requests, classifying them as _Clean_, _Likely clean_, _Likely attack_, or _Attack_.
112112

113-
- **Bot likelihood**: [Bot score](/bots/concepts/bot-score/) analysis of incoming requests, classifying them as _Automated_, _Likely automated_, or _Likely human_.
113+
- **Bot likelihood**: [Bot score](/bots/concepts/bot-score/) analysis of incoming requests, classifying them as _Automated_, _Likely automated_, _Likely human_, or _Verified bot_.
114114

115115
- **Rate limit analysis**: Displays data on the request rate for traffic matching the selected filters and time period. Use this tab to [find an appropriate rate limit](/waf/rate-limiting-rules/find-rate-limit/) for incoming traffic matching the applied filters.
116116

src/content/docs/waf/rate-limiting-rules/find-rate-limit.mdx

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,13 @@ sidebar:
66
head:
77
- tag: title
88
content: Find an appropriate rate limit
9-
109
---
1110

1211
The **Rate limit analysis** tab in [Security Analytics](/waf/analytics/security-analytics/) displays data on the request rate for traffic matching the selected filters and time period. Use this tab to determine the most appropriate rate limit for incoming traffic matching the applied filters.
1312

1413
:::note
1514

16-
The **Rate limit analysis** tab is only available to Enterprise customers.
15+
The **Rate limit analysis** tab is only available to Enterprise customers.
1716
:::
1817

1918
## User interface overview
@@ -24,16 +23,17 @@ The **Rate limit analysis** tab is available at the zone level in **Security** >
2423

2524
The main chart displays the distribution of request rates for the top 50 unique clients observed during the selected time interval (for example, `1 minute`) in descending order. You can group the request rates by the following unique request properties:
2625

27-
* **IP address**
28-
* [**JA3 fingerprint**](/bots/concepts/ja3-ja4-fingerprint/) (only available to customers with Bot Management)
29-
* **IP address and JA3 fingerprint** (only available to customers with Bot Management)
26+
- **IP address**
27+
- [**JA3 fingerprint**](/bots/concepts/ja3-ja4-fingerprint/) (only available to customers with Bot Management)
28+
- **IP & JA3** (only available to customers with Bot Management)
29+
- [**JA4 fingerprint**](/bots/concepts/ja3-ja4-fingerprint/) (only available to customers with Bot Management)
3030

3131
:::note
3232

33-
For more information on how Cloudflare calculates the request rate of incoming traffic, refer to [How Cloudflare determines the request rate](/waf/rate-limiting-rules/request-rate/).
33+
For more information on how Cloudflare calculates the request rate of incoming traffic, refer to [How Cloudflare determines the request rate](/waf/rate-limiting-rules/request-rate/).
3434
:::
3535

36-
***
36+
---
3737

3838
## Determine an appropriate rate limit
3939

@@ -45,28 +45,31 @@ For more information on how Cloudflare calculates the request rate of incoming t
4545

4646
3. In the **Traffic analysis** tab, select a specific time period:
4747

48-
* To look at the regular rate distribution, specify a period with non-peak traffic.
49-
* To analyze the rate of offending visitors/bots, select a period corresponding to an attack.
48+
- To look at the regular rate distribution, specify a period with non-peak traffic.
49+
- To analyze the rate of offending visitors/bots, select a period corresponding to an attack.
5050

5151
4. Apply filters to analyze a particular situation in your application where you want to apply rate limiting (for example, filter by `/login` URL path).
5252

5353
5. (Optional) To focus on non-automated/human traffic, use the bot score quick filter in the sidebar.
5454

5555
### 2. Find the rate
5656

57-
1. Choose the request properties (JA3, IP, or both) and the duration (1 min, 5 mins, or 1 hour) for your rate limit rule. The request properties you select will be used as [rate limiting rule characteristics](/waf/rate-limiting-rules/parameters/#with-the-same-characteristics).
57+
1. Switch to the **Rate limit analysis** tab.
58+
59+
2. Choose the request properties (JA3, IP, IP and JA3, or JA4) and the duration (1 min, 5 mins, or 1 hour) for your rate limit rule. The request properties you select will be used as [rate limiting rule characteristics](/waf/rate-limiting-rules/parameters/#with-the-same-characteristics).
5860

59-
2. Use the slider in the chart to move the horizontal line defining the rate limit. While you move the slider up and down, check the impact of defining a rate limiting rule with the selected limit on the displayed traffic.
61+
3. Use the slider in the chart to move the horizontal line defining the rate limit. While you move the slider up and down, check the impact of defining a rate limiting rule with the selected limit on the displayed traffic.
6062

6163
![User adjusting the rate limit in the Rate limit analysis chart to check the impact on recent traffic](/images/waf/rate-limit-adjust.gif)
6264

6365
:::note
6466

6567
Answering the following questions during your adjustments can help you with your analysis:
6668

67-
* "How many clients would have been caught by the rule and rate limited?"
68-
* "Can I visually identify abusers with above-average rate vs. the long tail of average users?"
69-
:::
69+
- "How many clients would have been caught by the rule and rate limited?"
70+
- "Can I visually identify abusers with above-average rate vs. the long tail of average users?"
71+
72+
:::
7073

7174
### 3. Validate your rate
7275

@@ -80,6 +83,6 @@ Answering the following questions during your adjustments can help you with your
8083

8184
2. Select the rule action. Depending on your needs, you can set the rule to log, challenge, or block requests exceeding the selected threshold.
8285

83-
It is recommended that you first deploy the rule with the *Log* action to validate the threshold, and change the action later to block or challenge incoming requests when you are confident about the rule behavior.
86+
It is recommended that you first deploy the rule with the _Log_ action to validate the threshold, and change the action later to block or challenge incoming requests when you are confident about the rule behavior.
8487

8588
3. To save and deploy your rate limiting rule, select **Deploy**. If you are not ready to deploy your rule, select **Save as Draft**.

0 commit comments

Comments
 (0)